Windows OS Update Management
  • 18 Oct 2023
  • 8 Minutes to read
  • PDF

Windows OS Update Management

  • PDF

Article Summary

One of the critical pieces of managing Windows 10 devices is to manage the Windows OS updates. It is important for organisations to define a policy that either automates or controls the various updates that Windows offers like the OS updates, feature updates and security patches.

Scalefusion lets the IT Admins configure the OS update policy on the managed Windows 10 devices so that they can ensure that the rollouts are controlled. Furthermore you can control which components to auto update and selectively updates others.

If you have configured updates that require your approval then, Scalefusion also offers to check updates at a device or a device group level and apply pending updates.

This document walks you through the various policies on offer around OS updates.

Configuring Windows OS Update Policy

IT Admins can configure a Windows OS update policy for the managed devices by creating a Device Profile and applying to the devices. We suggest you create a Test profile and apply them to a set of test devices to verify the behavior before you make the changes to your main device profile applied to production devices.

  1. The policies related to OS updates are provided in Windows Device Profile. Start by creating a Windows Device Profile or Edit an existing one. Navigate to Device Profiles & Policies > Device Profiles and edit an existing profile or create a new Windows profile.
  2. In the Device Profile, navigate to Settings > Windows Updates > Windows MDM Based Settings section to start defining the OS update policy.
  3. To configure the Windows Update policies for all the devices to which this profile is applied, enable Configure Windows Policies. Once you enable this you can configure the various settings by clicking on the section and expanding it.
  4. Auto Update Settings: This section helps you control the automatic updates behaviour.
    SettingDescription
    Active Hours StartConfigure a start time for the active hours that prevents the device from rebooting. Works in combination with end time.
    Active Hours EndConfigure an end time for the active hours that prevents the device from rebooting. Works in combination with the start time.
    Active Hours Max RangeThe max range for the active hours during which the device is not rebooted capped at 18 hours
    Auto Update

    Configure automatic update behaviour by selecting one of the options below,

    • Notify the user before downloading the update
    • Auto install the update and then notify the user to schedule a device restart
    • Auto install and restart
    • Auto install and restart at a specified time
    • Auto install and restart without end-user control
    • Turn off automatic updates
    Automatic Maintainance Wake Up
    Update Notification Level

    Control the Notification behaviour for updates by selecting one of the options below,

    • Use default Windows Update notifications
    • Turn off all, excluding restart warnings
    • Turn off all, including restart warnings
    Fill Empty Cell URLs
  5. Deferral Settings: Choose how you would like to defer the OS updates by configuring these settings,
    SettingDescription
    Defers Feature UpdatesDefers Feature Updates for the specified number of days.
    Pause Feature UpdatesAllows IT Admins to pause Feature Updates for up to 60 days.
    Configure Deadline for Feature UpdatesAllows IT admins to specify the number of days before feature updates are installed automatically. Updates and restarts will occur regardless of active hours.
    Defers Quality UpdatesDefers Quality Updates for the specified number of days.
    Pause Quality UpdatesAllows IT Admins to pause Quality Updates up to 35 days.
    Configure Deadline for Quality UpdatesAllows IT admins to specify the number of days before quality updates are installed automatically. Updates and restarts will occur regardless of active hours.
    Configure Deadline for Grace PeriodAdd grace period to the deadlines for quality and feature updates before the device restarts automatically.
    Configure Deadline for No Auto RebootIf enabled then devices will not automatically restart outside of active hours until the deadline for feature and/or quality updates are reached, even if applicable updates are already installed and pending a restart.
    Feature Update Uninstall PeriodEnable IT admin to configure feature update uninstall period.
  6. Scheduling Settings: Configure a schedule for OS updates to be installed,
    SettingDescription

    Schedule Install Day

    Configure if you want to install updates everyday or a specific day.
    Schedule Install WeekConfigure if you want to install updates every week or a specific week of the month.
    Schedule Install TimeEnables the IT admin to schedule the time of the update installation.
  7. Branching Settings: Configure the settings that are under development but applicable on Windows Insider preview builds.
    The options are,
    SettingDescription
    Update Branch

    Configure this policy to specify the branch from which a device receives its updates. Following are the options to select from:

    • Semi-annual Channel (Targeted): Organizations will receive updates twice a year, with new features and capabilities that have been tested and validated by Microsoft.
    • Windows Insider build - Fast: This is the most active and frequently updated level, providing users with access to the latest features and improvements
    • Windows Insider build - Slow: The builds released in this channel are more stable and have undergone additional testing compared to the "fast" level thereby being more reliable for daily use.
    • Release Windows Insider Build


    Manage Preview Builds

    Configure this policy to control the updates you should receive prior to the update being released globally, from the following:

    • Disable preview builds
    • Disable preview builds once the next release is public
    • Enable preview builds

    Microsoft App UpdatesAllow/Disallow scanning of Microsoft app updates
    WSUS Server URLProvide WSUS Server URL to fetch updates offered from Windows Server Update Service (WSUS)
    Allow Update ServiceSpecify whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. Enabling this policy will disable the device's ability to retrieve information from public services like Windows Update and the Microsoft Store.
    Allow Non Microsoft Signed UpdatesThis feature allows IT administrators to control whether Automatic Updates will accept updates signed by sources other than Microsoft.
    Alternate Intranet server for UpdatesSpecify an alternate intranet server to host updates from Microsoft Update. This update service can then be used to automatically update computers on your network. Specify a server on your network which will function as an internal update service.
    Exclude Drivers UpdateWindows Update includes updates that have a Driver classification. Enabling this setting will exclude Windows Update (WU) drivers during Quality updates.
  8. Administration & Network Settings: In this section configure the updates that should be automated and the ones that should be blocked.
    SettingDescription
    Require Update ApprovalEnable this to configure which updates should be automatically applied and which would require IT Admins approval.
    Once this policy is applied to a device, it cannot be reverted and the IT Admin has to apply the pending updates from Scalefusion Dashboard or locally on the device.

    From the list, select the components that will be automatically updated. Any item that is not checked will not be updated automatically and the IT Admin would have to install them from Scalefusion Dashboard or locally on the device.
    • Application
    • Connectors
    • Critical Updates
    • Definition Updates
    • Developer Kits
    • Feature Packs
    • Guidance
    • Security Updates
    • Service Packs
    • Tools
    • Update Rollups
    • General
    Disable UI/UX to Pause Windows UpdateWhen this policy is enabled, the user cannot access the "Pause updates" feature.
    Disable UI/UX to Scan Windows UpdateWhen this policy is enabled, the user cannot access the Windows Update scan, download, and install features.
    Allow Auto Update over Metered NetworkAllow updates to be downloaded over a metered network connection.
  9. Scanning: In this section configure the scan frequency for updates.
    SettingsDescription
    Detection FrequencySpecifies the scan frequency from every 1 - 22 hours. Default is 22 hours.

    Disable Dual Scan

    Do not allow update deferral policies to cause scans against Windows Update. With the policy enabled, those scans are prevented, and the deferral policies work as expected.
  10. Restart and Notification: Configure the device restart and notification settings in this section.




















  11. Delivery Optimization: Configure settings that optimize OS update delivery in a network of devices and configure caching policies.

Once you have configured the OS Update policy, save the Device Profile and apply it to the device where you want these changes to take effect.

Managing OS Updates at Group or Device Level

Basing on your OS update policy there might be some updates that you can manage at a device level. Only the items that were not selected under the Require Update Approval setting in the Administration & Network settings section can be controlled at a device level. Scalefusion can query for only these items and list of updates gets updated at a device level.

Here we see how we can check and initiate update at a Group and Devicelevel.

Please note that only the updates that Requires Admin approval as per OS update policy will be shown here.


Viewing & Initiating update at Device Group Level

  1. Navigate to the Device Group section and click on the group where you want to check for updates.
  2. Navigate to Devices tab, click on Actions drop-down and click on View Updates in front of Windows 10 & above,
  3. If any of the devices have updates available then you would see the screen below,
    1. Title: The name of the update as returned by the OS. If no name is returned then it is displayed as an Unidentified Update
    2. Update Type: The type of the update
    3. Status: The current status of the update which is either, Pending, Approved or Installed
    4. Devices: The number of devices in this group where this is available. Clicking on the count of devices shows you the devices where it is available.
    5. Additional Options
      1. Sync Install Status: Sends a query to all devices to retrieve the install status. Please close and reopen the dialog for the latest status to be displayed.
      2. Sync Available Updates: Sends a query to all devices to retrieve the available updates. Please close and reopen the dialog for the latest results to be displayed.
  4. Select the updates that you want to rollout and click on UPDATEto start the updates on the device. Once you have pushed the updates the status will change to Approved.
    By clicking on UPDATE you are accepting the EULA agreement. Due to some technical issues with the MDM protocol the content of the EULA

Viewing & Initiating update at Device Level

  1. Navigate to the Devices section and click on the Windows 10 devices for which you want to view the available updates.
  2. Once in the Device details view, click on the View Updates button to view the updates
  3. Select the updates that you want to install on this particular device and click on Update
By clicking on UPDATE you are accepting the EULA agreement. Due to some technical issues with the MDM protocol the content of the EULA



Was this article helpful?