Configuring Software Updates in Configuration Manager 2012

Updated: May 1, 2011

Applies To: System Center Configuration Manager 2012

Before software update compliance assessment data is displayed in the Configuration Manager 2012console and before you can deploy software updates to client computers, you must install and configure a software update point, synchronize the software updates metadata, and verify the configuration for settings associated with software updates.

When you have a Configuration Manager 2012 hierarchy, you should install and configure the software update point at the central administration site first, and then install and configure the software update points on other sites. Some settings are only available when you configure the software update point on a central administration site, or stand-alone primary site, and there are different options that you must consider depending on where the software update point is installed. Use the steps in the following table to install and configure the software update point, synchronize software updates, and configure the setting associated with software updates.

Use the following steps and the procedures in this topic to configure software updates in Configuration Manager 2012.

 

Step Details More Information

Step 1: Install and Configure a Software Update Point

Central administration site

When you have a Configuration Manager 2012 hierarchy, install and configure the software update point on the central administration site before you install it on child primary sites and secondary sites. To enable software update in the hierarchy, you must have an active software update point on the central administration site.

For more information, see the following procedure in this topic: Install and Configure a Software Update Point on the Central Administration Site.

Stand-alone primary site

When you have a stand-alone primary site, a primary site that is not connected to a central administration site, install and configure the software update point to enable software update deployment at the site. When you have a secondary site connected to the stand-alone primary site, you must install the software update point on the primary site first.

For more information, see the following procedure in this topic: Install and Configure a Software Update Point on a Stand-Alone Primary Site.

Child primary site

After you install a software update point on the central administration site, install and configure the software update point on child primary sites to enable software update deployment at the site. When you have a secondary site connected to the primary site, you must install the software update point on the primary site first.

For more information, see the following procedure in this topic: Install and Configure a Software Update Point on a Child Primary Site.

Secondary site

After you install the software update point on a primary site, you can optionally install and configure the software update point on a connected secondary site. When you do not have a software update point installed at the secondary site, clients assigned to the secondary site will use the software update point at the parent primary site. When there is limited network bandwidth to the software update point at the parent primary site or when Windows Server Update Services (WSUS) is approaching the maximum number of client computers at the parent primary site, you should install a software update point at the secondary site.

For more information, see the following procedure in this topic: Install and Configure a Software Update Point on a Secondary Site.

Step 2: Synchronize Software Updates

Synchronize software updates on a connected software update point

Software updates synchronization is the process of retrieving software updates metadata from Microsoft Update and replicating the metadata to all sites enabled for software updates in the Configuration Manager 2012hierarchy. The software update point on the central administration site, or on a stand-alone primary site, retrieves software updates metadata from Microsoft Update. Child primary sites, secondary sites, and remote Internet-based software update points retrieve the software updates metadata from the software update point identified as the upstream update source. Access to the upstream update source is required to successfully synchronize software updates.

For more information, see the following procedure in this topic: Synchronize Software Updates.

Synchronize software updates on a disconnected software update point

Automatic software updates synchronization is not possible when the software update point for the central administration site or stand-alone primary site is disconnected from the Internet, or when an Internet-based software update point is disconnected from the active software update point for the site. To retrieve the latest software updates for a disconnected software update point, you must use the WSUSUtil tool to export the software updates metadata and license terms files from a software update source, and then import the metadata and files to the disconnected software update point.

For more information, see the following procedure in this topic: Synchronize Software Updates on a Disconnected Software Update Point.

Step 3: Configure the Settings Associated with Software Updates

There are several Configuration Manager 2012 client settings and group policy configurations that are associated with software updates. Review these settings and configurations to verify that they are appropriate for your environment.

For more information, see the following procedures in this topic: Configure the Settings Associated with Software Updates.

In a Configuration Manager 2012 hierarchy, you should always install and configure the software update point starting with the central administration site. The software update point at the central administration site is typically configured to synchronize with Microsoft Update, retrieving the software updates metadata based on the criteria that you specify in the software update point properties. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure the central administration site. For more information about planning for software updates and to determine your software update point infrastructure, see Planning for Software Updates in Configuration Manager 2012.

Use the following procedure to add the software update point site system role to the central administration site.

noteNote
Do not use this procedure when you have decided to configure the software update point to use an NLB cluster. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.

To install and configure the software update point for the central administration site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations and click Servers and Site System Roles.

  3. Add the software update point site system role to a new or existing site system server by using the associated step:

    • New site system server: On the Home tab, in the Create group, click Create Site System Server. The Create Server Wizard opens.

    • Existing site system server: Click the server in which you want to install the software update point site system role. When you click a server, a list of the site system roles that are already installed on the server are displayed in the details pane.

      On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.

  4. On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.

  5. On the System Role Selection page, select Software update point from the list of available roles, and then click Next.

  6. On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.

  7. On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.

    TipTip
    To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS.
  8. On the Synchronization Source page, select Synchronize from Microsoft Update to synchronize software updates from Microsoft Update. The central administration site must have Internet access or synchronization will fail. This setting is available only when configuring the software update point on the central administration site or stand-alone primary site.

    ImportantImportant
    When the software update point on the central administration site is disconnected from the Internet, you must select Do not synchronize from Microsoft Update and manually synchronize software updates. For more information, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.
  9. Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.

  10. On the Synchronization Schedule page, specify whether to synchronize software updates on a schedule. This setting is configured only on the software update point for the central administration site.

    TipTip
    You should schedule software updates synchronization to run using a timeframe appropriate for your environment. One common scenario is to set the software updates synchronization schedule to run shortly after Microsoft’s regular security update release on the second Tuesday of each month, typically referred to as Patch Tuesday.
    noteNote
    When you choose not to enable software updates synchronization on a schedule, you can manually synchronize software updates from the All Software Updates or Software Update Groups node in the Software Library workspace. For more information, see the following section in this topic: Software Updates Synchronization.
  11. Specify whether to create an alert when synchronization fails, and then click Next. When selected, you can go to the Software Update Point Synchronization Status node in the Monitoring workspace to monitor the synchronization state for all software update points in your hierarchy.

  12. On the Supersedence Rules page, specify how to manage superseded software updates, and then click Next. This setting is configured only on the software update point for the central administration site.

    noteNote
    Typically, a software update that supersedes another software update does one or more of the following:
    • Enhances, improves, or adds to the fix provided by one or more previously released updates.

    • Improves the efficiency of its update file package, which is installed on client computers if the update is approved for installation. For example, the superseded update might contain files that are no longer relevant to the fix or to the operating systems now supported by the new update, so those files are not included in the superseding update's file package.

    • Updates newer versions of a product, or in other words, is no longer applicable to older versions or configurations of a product. Updates can also supersede other updates if modifications have been made to expand language support. For example, a later revision of a product update for Microsoft Office might remove support for an older operating system, but add additional support for new languages in the initial update release.

    On the Supersedence Rules page, you can specify that superseded software updates are immediately expired, which prevents them from being included in new deployments and flags existing deployments to indicate that they contain one or more expired software updates. Or, you can specify a period of time before superseded software updates are expired, which allows you to continue to deploy them. Consider the following scenarios in which you might need to deploy a superseded software update:
    • If a superseding software update supports only newer versions of an operating system, and some of your client computers run earlier versions of the operating system.

    • If a superseding software update has more restricted applicability than the software update it supersedes, which would make it inappropriate for some client computers.

    • If a superseding software update has not been approved for deployment in your production environment.

  13. On the Classifications page, specify the software update classifications for which you want to synchronize software updates, and then click Next. This setting is configured only for the software update point at the central administration site.

    noteNote
    Every software update is defined with an update classification that helps to organize the software update and better define the type software updates you want to synchronize. During the synchronization process, the software updates metadata for the classifications that you specify will be synchronized. Configuration Manager 2012 provides the ability to synchronize software updates with the following software update classifications:
    • Critical Updates: Specifies a broadly released update for a specific problem that addresses a critical, non security-related bug.

    • Definition Updates: Specifies an update to virus or other definition files.

    • Feature Packs: Specifies new product features that are distributed outside of a product release and typically included in the next full product release.

    • Security Updates: Specifies a broadly released update for a product-specific, security-related issue.

    • Service Packs: Specifies a cumulative set of hotfixes that are applied to an application. These hotfixes can include security updates, critical updates, software updates, and so on.

    • Tools: Specifies a utility or feature that helps to complete one or more tasks.

    • Update Rollups: Specifies a cumulative set of hotfixes that are packaged together for easy deployment. These hotfixes can include security updates, critical updates, updates, and so on. An update rollup generally addresses a specific area, such as security or a product component.

    • Updates: Specifies an update to an application or file currently installed.

  14. On the Products page, specify the products for which you want to synchronize software updates, and then click Next. This setting is configured only on the software update point for the central administration site.

    noteNote
    The metadata for each software update defines what product or products the software update is applicable. A product is a specific edition of an operating system or application, for example, Windows Server 2008. A product family is the base operating system or application from which the individual products are derived. An example of a product family is Windows, of which Windows Server 2008 is a member. You can specify a product family or individual products within a product family. When software updates are applicable to multiple products, and at least one of the products has been selected for synchronization, all of the products will appear in the Configuration Manager console even if some have not been selected. For example, if Windows Server 2008 is the only operating system that you have selected, and if a software update applies to Windows 7 and Windows Server 2008, both products will be displayed in the Configuration Manager console. The more products that you select, the longer it will take to synchronize software updates.
  15. On the Languages page, specify the languages for which you want to synchronize software update files and summary details, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. The Summary Details settings are configured only on the software update point for the central administration site.

    noteNote
    You can specify the languages for software update files and summary details.
    • Software Update File

      The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default on the Language Selection page of the wizard and can be modified as necessary.

    • Summary Details

      The summary details information is the metadata for software updates. The metadata provides the information about the software update, such as name, description, products that the update supports, update classification, article ID, download URL, applicability rules, and so on. When you select the summary details languages, select only the languages needed in your environment. The software updates metadata is displayed in the locale of the operating system where the Configuration Manager 2012 console is running. If the localized properties for the software updates are not available, the information displays in English.

      The more languages you select for summary details, the longer it will take to synchronize software updates.

       

      ImportantImportant
      Select all of the summary details languages that will be needed in your Configuration Manager 2012 hierarchy before you run software updates synchronization for the first time. Though you can change the summary details languages after the software update point is synchronized on the central administration site, the metadata in the new languages will not be retrieved for software updates that have already been synchronized unless there is an updated version for the software update available.
  16. On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.

  17. To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.

After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:

  • Client connection settings: The client connection settings allow you to configure custom ports, whether the software update point accepts communications from clients on the Internet, and to enable SSL communications for the WSUS server. During the initial software update point installation, you selected a standard set of ports, the software update point is configured to accept communications from only clients on the intranet, and SSL communications is not enabled.

  • Internet-based software update point: When the active software update point is configured not to accept communications from clients on the Internet, you can specify an Internet-based software update point that is accessible from clients on the Internet.

  • Network Load Balancing (NLB): You can configure the active software update point or Internet-based software update point to use an NLB cluster. When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.

When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the central administration site.

To complete software update point configuration on the central administration site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations, click Sites, and then select the central administration site.

  3. On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. Software Update Point Component Properties opens.

  4. On the General tab, configure the following settings:

    • Active software update point for this site: Specifies whether the active software update point is configured, and if so, whether it is installed on the site server, a remote site system server, or configured to use NLB.

      noteNote
      This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server.

      noteNote
      The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server.

      WarningWarning
      When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.
    • Active software update point: Specifies the name of the remote site system server that you selected as the active software update point.

      noteNote
      This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point.
    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Allow intranet-only client connections: Specifies that this software update point accepts only connections from clients on the intranet. When you select this setting, the options on the Internet-based tab are enabled and provide you with the option to configure a different remote software update point that accepts connections from clients on the Internet.

    • Allow both intranet and internet client connections: Specifies that this software update point accepts connections from both clients on the intranet and Internet. When this setting is selected, the settings on the Internet-based tab are disabled.

      Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:

      • The WSUS server will synchronize software updates metadata using SSL. The upstream update server must be configured for SSL or synchronization will fail.

      • For clients to connect to the WSUS server, both the clients and WSUS Web site must have a trusted root CA in common. Without a common certificate, clients will fail to scan for software update compliance..

      ImportantImportant
      When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  5. On the Internet-based tab, configure the following settings:

    noteNote
    The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab.
    • Internet-based software update point: Specifies whether the Internet-based software update point is configured, and if so, whether it is installed on a remote site system server or configured to use NLB.

      noteNote
      When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server. The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point.

      TipTip
      For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server. When the Enable SSL for this WSUS server setting is enabled, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.

    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Do not synchronize from the software update point located on the intranet: Specifies that the Internet-based software update point does not synchronize with the active software update point. Select this option if the Internet-based software update point is disconnected from the active software update point. For more information about synchronizing software updates on a disconnected software updates point, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.

      ImportantImportant
      Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  6. Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 10-15 in the preceding procedure.

Top of page

The software update point site system role must be installed, configured, and set to active before you can assess software updates compliance or deploy software updates assigned to the stand-alone primary site. The software update point on a stand-alone primary site is typically configured to synchronize with Microsoft Update, retrieving the software updates metadata for the criteria that you specify in the software update point properties. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure for your site. For example, are you going to install the software update point on the local site server or a remote site system server, will you install an Internet-based software update point to accept communications from clients on the Internet, or should you configure the software update point to use Network Load Balancing (NLB). For more information about planning for software updates, see Planning for Software Updates in Configuration Manager 2012.

Use the following procedure to install and configure the software update point on a stand-alone primary site.

To install and configure the software update point for a stand-alone primary site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations and click Servers and Site System Roles.

  3. Add the software update point site system role to a new or existing site system server by using the associated step:

    • New site system server: on the Home tab, in the Create group, click Create Site System Server. The Create Server Wizard opens.

    • Existing site system server: click the server in which you want to install the software update point site role. When you click a server, a list of the site system roles that are already installed on the server are displayed in the details pane.

      On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.

  4. On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.

  5. On the System Role Selection page, select Software update point from the list of available roles, and then click Next.

  6. On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.

  7. On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.

    TipTip
    To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS.
  8. On the Synchronization Source page, select Synchronize from Microsoft Update to synchronize software updates from Microsoft Update. The stand-alone primary site must have Internet access or synchronization will fail. This setting is available only when configuring the software update point on the central administration site or stand-alone primary site.

    ImportantImportant
    When the software update point on the stand-alone primary site is disconnected from the Internet, you must select Do not synchronize from Microsoft Update and manually synchronize software updates. For more information, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.
    noteNote
    When there is a firewall between the active software update point and the Internet, the firewall might need to be configured to accept the HTTP and HTTPS ports used for the WSUS Web site. You can also choose to restrict access on the firewall to limited domains. For more information about configuring your firewall to support software updates, see How to Configure a Firewall for Software Updates.
  9. Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.

  10. On the Synchronization Schedule page, specify whether to synchronize software updates on a schedule. This setting is configured only on the software update point for the stand-alone primary site.

    TipTip
    You should schedule software updates synchronization to run using a timeframe appropriate for your environment. One common scenario is to set the software updates synchronization schedule to run shortly after Microsoft’s regular security update release on the second Tuesday of each month, typically referred to as Patch Tuesday.
    noteNote
    When you choose not to enable software updates synchronization on a schedule, you can manually synchronize software updates from the All Software Updates or Software Update Groups node in the Software Library workspace. For more information, see the following section in this topic: Software Updates Synchronization.
  11. Specify whether to create an alert when synchronization fails, and then click Next. When selected, you can go to the Software Update Point Synchronization Status node in the Monitoring workspace to monitor the synchronization state for all software update points in your hierarchy.

  12. On the Supersedence Rules page, specify how to manage superseded software updates, and then click Next. This setting is configured only on the software update point for the stand-alone primary site.

    noteNote
    Typically, a software update that supersedes another software update does one or more of the following:
    • Enhances, improves, or adds to the fix provided by one or more previously released updates.

    • Improves the efficiency of its update file package, which is installed on client computers if the update is approved for installation. For example, the superseded update might contain files that are no longer relevant to the fix or to the operating systems now supported by the new update, so those files are not included in the superseding update's file package.

    • Updates newer versions of a product, or in other words, is no longer applicable to older versions or configurations of a product. Updates can also supersede other updates if modifications have been made to expand language support. For example, a later revision of a product update for Microsoft Office might remove support for an older operating system, but add additional support for new languages in the initial update release.

    On the Supersedence Rules page, you can specify that superseded software updates are immediately expired, which prevents them from being included in new deployments and flags existing deployments to indicate that they contain one or more expired software updates. Or, you can specify a period of time before superseded software updates are expired, which allows you to continue to deploy them. Consider the following scenarios in which you might need to deploy a superseded software update:
    • If a superseding software update supports only newer versions of an operating system, and some of your client computers run earlier versions of the operating system.

    • If a superseding software update has more restricted applicability than the software update it supersedes, which would make it inappropriate for some client computers.

    • If a superseding software update has not been approved for deployment in your production environment.

  13. On the Classifications page, specify the software update classifications for which you want to synchronize software updates, and then click Next. Secondary sites will automatically use the software update classifications configured for the software update point for the stand-alone primary site.

    noteNote
    Every software update is defined with an update classification that helps to organize the different types of updates. During the synchronization process, the software updates metadata for the specified classifications will be synchronized. Configuration Manager 2012 provides the ability to synchronize software updates with the following update classifications:
    • Critical Updates: Specifies a broadly released update for a specific problem that addresses a critical, non security-related bug.

    • Definition Updates: Specifies an update to virus or other definition files.

    • Feature Packs: Specifies new product features that are distributed outside of a product release and typically included in the next full product release.

    • Security Updates: Specifies a broadly released update for a product-specific, security-related issue.

    • Service Packs: Specifies a cumulative set of hotfixes that are applied to an application. These hotfixes can include security updates, critical updates, software updates, and so on.

    • Tools: Specifies a utility or feature that helps to complete one or more tasks.

    • Update Rollups: Specifies a cumulative set of hotfixes that are packaged together for easy deployment. These hotfixes can include security updates, critical updates, updates, and so on. An update rollup generally addresses a specific area, such as security or a product component.

    • Updates: Specifies an update to an application or file currently installed.

  14. On the Products page, specify the products for which you want to synchronize software updates, and then click Next. Secondary sites will automatically use the products configured for the software update point for the stand-alone primary site.

    When selecting the products, be aware that the more products that are selected, the longer it takes to complete software updates synchronization.

    noteNote
    The metadata for each software update defines what product or products for which the update is applicable. A product is a specific edition of an operating system or application, for example, Windows Server 2008. A product family is the base operating system or application from which the individual products are derived. An example of a product family is Windows, of which Windows Server 2008 is a member. You can specify a product family or individual products within a product family. When software updates are applicable to multiple products, and at least one of the products has been selected for synchronization, all of the products will appear in the Configuration Manager console even if some have not been selected. For example, if Windows Server 2008 is the only operating system that you have selected, and if a software update applies to Windows 7 and Windows Server 2008, both products will be displayed in the Configuration Manager console. The more products that you select, the longer it will take to synchronize software updates.
  15. On the Languages page, specify the languages for which you want to synchronize software update files and summary details, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. Secondary sites will automatically use the summary details configured for the software update point for the stand-alone primary site.

    noteNote
    • Software Update File

      The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default on the Language Selection page of the wizard and can be modified as necessary.

    • Summary Details

      The summary details information is the metadata for software updates. The metadata provides the information about the software update, such as name, description, products that the update supports, update classification, article ID, download URL, applicability rules, and so on. When you select the summary details languages, select only the languages needed in your environment. The more languages that you select, the longer it will take to synchronize software updates. The software updates metadata is displayed in the locale of the operating system where the Configuration Manager 2012 console is running. If the localized properties for the software updates are not available, the information displays in English.

       

      ImportantImportant
      Select all of the summary details languages that will be needed for your Configuration Manager 2012 site before you run software updates synchronization for the first time. Though you can change the summary details languages after the software update point is synchronized on the stand-along primary site, the metadata in the new languages will not be retrieved for software updates that have already been synchronized unless there is an updated version for the software update available.
  16. On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.

  17. To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.

After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:

  • Client connection settings: The client connection settings allow you to configure custom ports, whether the software update point accepts communications from clients on the Internet, and to enable SSL communications for the WSUS server. During the initial software update point installation, you selected a standard set of ports, the software update point is configured to accept communications from only clients on the intranet, and SSL communications is not enabled.

  • Internet-based software update point: When the active software update point is configured not to accept communications from clients on the Internet, you can specify an Internet-based software update point that is accessible from clients on the Internet.

  • Network Load Balancing (NLB): You can configure the active software update point or Internet-based software update point to use an NLB cluster. When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.

When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the central administration site.

To complete software update point configuration on the stand-alone primary site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations, click Sites, and then select the central administration site.

  3. On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. The Software Update Point Component Properties opens.

  4. On the General tab, configure the following settings:

    • Active software update point for this site: Specifies whether the active software update point is configured, and if so, whether it is installed on the site server, a remote site system server, or configured to use NLB.

      noteNote
      This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server.

      noteNote
      The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server.

      WarningWarning
      When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.
    • Active software update point: Specifies the name of the remote site system server that you selected as the active software update point.

      noteNote
      This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point.
    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Allow intranet-only client connections: Specifies that this software update point accepts only connections from clients on the intranet. When you select this setting, the options on the Internet-based tab are enabled and provide you with the option to configure a different remote software update point that accepts connections from clients on the Internet.

    • Allow both intranet and internet client connections: Specifies that this software update point accepts connections from both clients on the intranet and Internet. When this setting is selected, the settings on the Internet-based tab are disabled.

      Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:

      • The WSUS server will synchronize software updates metadata using SSL. The upstream update server must be configured for SSL or synchronization will fail.

      • For clients to connect to the WSUS server, both the clients and WSUS Web site must have a trusted root CA in common. Without a common certificate, clients will fail to scan for software update compliance..

      ImportantImportant
      When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  5. On the Internet-based tab, configure the following settings:

    noteNote
    The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab.
    • Internet-based software update point: Specifies whether the Internet-based software update point is configured, and if so, whether it is installed on a remote site system server or configured to use NLB.

      noteNote
      When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server. The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point.

      TipTip
      For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server. When the Enable SSL for this WSUS server setting is enabled, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.

    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Do not synchronize from the software update point located on the intranet: Specifies that the Internet-based software update point does not synchronize with the active software update point. Select this option if the Internet-based software update point is disconnected from the active software update point. For more information about synchronizing software updates on a disconnected software updates point, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.

      ImportantImportant
      Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  6. Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 10-15 in the preceding procedure.

Top of page

In a Configuration Manager 2012 hierarchy, you should always install and configure the software update point on child primary sites after the software update point has been installed and configured for the central administration site. The software update point site system role must be installed, configured, and set to active before you can assess software updates compliance or deploy software updates assigned to the child primary site. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure for your site. For example, are you going to install the software update point on the local site server or a remote site system server, will you install an Internet-based software update point to accept communications from clients on the Internet, or should you configure the software update point to use Network Load Balancing (NLB). For more information about planning for software updates, see Planning for Software Updates in Configuration Manager 2012.

Use the following procedure to install and configure the software update point on a child primary site.

To install and configure the software update point for a child primary site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations and click Servers and Site System Roles.

  3. Add the software update point site system role to a new or existing site system server by using the associated step:

    • New site system server: on the Home tab, in the Create group, click Create Site System Server. The Create Server Wizard opens.

    • Existing site system server: click the server in which you want to install the software update point site role. When you click a server, a list of the site system roles that are already installed on the server are displayed in the details pane.

      On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.

  4. On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.

  5. On the System Role Selection page, select Software update point from the list of available roles, and then click Next.

  6. On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.

  7. On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.

    TipTip
    To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS.
  8. On the Synchronization Source page, Synchronize from an upstream update server is automatically selected to synchronize software updates from the software update point at the central administration site. The child primary site must have access to the software update point on the central administration site or synchronization will fail. The Synchronize from Microsoft Update and Do not synchronize from Microsoft Update settings are available only when configuring the software update point on the central administration site or stand-alone primary site.

  9. Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.

  10. On the Languages page, specify the languages for which you want to synchronize software update files, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. Child primary sites will automatically use the summary details (metadata about the software updates) configured for the software update point at the central administration site.

    noteNote
    The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default and can be modified as necessary.
  11. On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.

  12. To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.

After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:

  • Client connection settings: The client connection settings allow you to configure custom ports, whether the software update point accepts communications from clients on the Internet, and to enable SSL communications for the WSUS server. During the initial software update point installation, you selected a standard set of ports, the software update point is configured to accept communications from only clients on the intranet, and SSL communications is not enabled.

  • Internet-based software update point: When the active software update point is configured not to accept communications from clients on the Internet, you can specify an Internet-based software update point that is accessible from clients on the Internet.

  • Network Load Balancing (NLB): You can configure the active software update point or Internet-based software update point to use an NLB cluster. When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.

When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the child primary site.

To complete software update point configuration on the child primary site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations, click Sites, and then select the child primary site.

  3. On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. The Software Update Point Component Properties opens.

  4. On the General tab, configure the following settings:

    • Active software update point for this site: Specifies whether the active software update point is configured, and if so, whether it is installed on the site server, a remote site system server, or configured to use NLB.

      noteNote
      This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point for the site and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server.

      noteNote
      The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server.

      WarningWarning
      When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.
    • Active software update point: Specifies the name of the remote site system server that you selected as the active software update point.

      noteNote
      This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point.
    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Allow intranet-only client connections: Specifies that this software update point accepts only connections from clients on the intranet. When you select this setting, the options on the Internet-based tab are enabled and provide you with the option to configure a different remote software update point that accepts connections from clients on the Internet.

    • Allow both intranet and internet client connections: Specifies that this software update point accepts connections from both clients on the intranet and Internet. When this setting is selected, the settings on the Internet-based tab are disabled.

      Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:

      • The WSUS server will synchronize software updates metadata using SSL. The upstream update server must be configured for SSL or synchronization will fail.

      • For clients to connect to the WSUS server, both the clients and WSUS Web site must have a trusted root CA in common. Without a common certificate, clients will fail to scan for software update compliance..

      ImportantImportant
      When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  5. On the Internet-based tab, configure the following settings:

    noteNote
    The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab.
    • Internet-based software update point: Specifies whether the Internet-based software update point is configured, and if so, whether it is installed on a remote site system server or configured to use NLB.

      noteNote
      When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server. The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point.

      TipTip
      For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server. When the Enable SSL for this WSUS server setting is enabled, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.

    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Do not synchronize from the software update point located on the intranet: Specifies that the Internet-based software update point does not synchronize with the active software update point. Select this option if the Internet-based software update point is disconnected from the active software update point. For more information about synchronizing software updates on a disconnected software updates point, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.

      ImportantImportant
      Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  6. Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 8-10 in the preceding procedure.

Top of page

In a Configuration Manager 2012 hierarchy, you should always install and configure the software update point on secondary sites after the software update point has been installed and configured for the parent primary site. Until you install a software update point at the secondary site, clients assigned to the secondary site will automatically use the software update point configured for the parent primary site. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure for your site. For example, are you going to install the software update point on the local site server or a remote site system server, will you install an Internet-based software update point to accept communications from clients on the Internet, or should you configure the software update point to use Network Load Balancing (NLB). For more information about planning for software updates, see Planning for Software Updates in Configuration Manager 2012.

Use the following procedure to install and configure the software update point on a secondary site.

To install and configure the software update point for a secondary site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations and click Servers and Site System Roles.

  3. Add the software update point site system role to a new or existing site system server by using the associated step:

    • New site system server: on the Home tab, in the Create group, click Create Site System Server. The Create Server Wizard opens.

    • Existing site system server: click the server in which you want to install the software update point site role. When you click a server, a list of the site system roles that are already installed on the server are displayed in the details pane.

      On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.

  4. On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.

  5. On the System Role Selection page, select Software update point from the list of available roles, and then click Next.

  6. On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.

  7. On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.

    TipTip
    To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS.
  8. On the Synchronization Source page, Synchronize from an upstream update server is automatically selected to synchronize software updates from the software update point at the parent primary site. The Synchronize from Microsoft Update and Do not synchronize from Microsoft Update settings are available only when configuring the software update point on the central administration site or stand-alone primary site.

  9. Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.

  10. On the Languages page, specify the languages for which you want to synchronize software update files, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. Secondary sites will automatically use the summary details (metadata about the software updates) configured for the software update point at the central administration site.

    noteNote
    The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default on the Language Selection page of the wizard and can be modified as necessary.
  11. On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.

  12. To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.

After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:

  • Client connection settings: The client connection settings allow you to configure custom ports, whether the software update point accepts communications from clients on the Internet, and to enable SSL communications for the WSUS server. During the initial software update point installation, you selected a standard set of ports, the software update point is configured to accept communications from only clients on the intranet, and SSL communications is not enabled.

  • Internet-based software update point: When the active software update point is configured not to accept communications from clients on the Internet, you can specify an Internet-based software update point that is accessible from clients on the Internet.

  • Network Load Balancing (NLB): You can configure the active software update point or Internet-based software update point to use an NLB cluster. When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.

When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the child primary site.

To complete software update point configuration on the secondary site

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations, click Sites, and then select the secondary site.

  3. On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. The Software Update Point Component Properties opens.

  4. On the General tab, configure the following settings:

    • Active software update point for this site: Specifies whether the active software update point is configured, and if so, whether it is installed on the site server, a remote site system server, or configured to use NLB.

      noteNote
      This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point for the site and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server.

      noteNote
      The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server.

      WarningWarning
      When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.
    • Active software update point: Specifies the name of the remote site system server that you selected as the active software update point.

      noteNote
      This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point.
    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Allow intranet-only client connections: Specifies that this software update point accepts only connections from clients on the intranet. When you select this setting, the options on the Internet-based tab are enabled and provide you with the option to configure a different remote software update point that accepts connections from clients on the Internet.

    • Allow both intranet and internet client connections: Specifies that this software update point accepts connections from both clients on the intranet and Internet. When this setting is selected, the settings on the Internet-based tab are disabled.

      Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:

      • The WSUS server will synchronize software updates metadata using SSL. The upstream update server must be configured for SSL or synchronization will fail.

      • For clients to connect to the WSUS server, both the clients and WSUS Web site must have a trusted root CA in common. Without a common certificate, clients will fail to scan for software update compliance..

      ImportantImportant
      When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  5. On the Internet-based tab, configure the following settings:

    noteNote
    The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab.
    • Internet-based software update point: Specifies whether the Internet-based software update point is configured, and if so, whether it is installed on a remote site system server or configured to use NLB.

      noteNote
      When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page.
      ImportantImportant
      When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster.
    • Port number: Specifies the HTTP port number configured on the WSUS server. The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point.

      TipTip
      For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS.
    • SSL port number: Specifies the SSL (HTTPS) port number configured on the WSUS server. When the Enable SSL for this WSUS server setting is enabled, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point.

    • Software Update Point Connection Account: Specifies the account that is used by the site server when it connects to a remote software update point or an active software update point configured as an NLB cluster. When this account is not specified, the computer account for the site server is used when connecting to the software update point.

      ImportantImportant
      The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer.
    • Do not synchronize from the software update point located on the intranet: Specifies that the Internet-based software update point does not synchronize with the active software update point. Select this option if the Internet-based software update point is disconnected from the active software update point. For more information about synchronizing software updates on a disconnected software updates point, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.

      ImportantImportant
      Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
  6. Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 8-10 in the preceding procedure.

Top of page

Software updates synchronization in Configuration Manager 2012 is the process of retrieving the software updates metadata that meets the criteria that you configure. The software update point on the central administration site or stand-alone primary site retrieves the metadata from Microsoft Update on a schedule or you can manually initiate synchronization from the Configuration Manager console. For the synchronization process to complete successfully, the software update point must have access to its upstream update source. When the software update point is disconnected from the upstream update source, you must use the WSUSUtil tool to export software updates metadata from a software updates source and import the metadata to the disconnected software update point. The following table lists the software update point types and the upstream update source in which the software update point requires access.

 

Software Update Point Upstream Update Source

Central administration site

Microsoft Update (Internet)

Stand-alone primary site

Microsoft Update (Internet)

Child primary site

Central administration site

Secondary site

Parent primary site

Remote Internet-based software update point

Active software update point for the site

Synchronize Software Updates from a Connected Software Update Point

Typically, the software update points in your Configuration Manager 2012 hierarchy will have access to the upstream update source. In this scenario, the software update point for the central administration site or stand-alone primary site will connect to the Internet and synchronize software updates from Microsoft Update, and then send a synchronization request to other sites to initiate the synchronization process. When the synchronization request is received at a site, the software update point for the site retrieves software updates metadata from the upstream update source.

noteNote
The software update point on child primary sites and secondary sites must be connected to the upstream update server to synchronize software updates. The software update point for the central administration site, or stand-alone primary site, and Internet-based software update points can use the export and import method for synchronizing software update when disconnected from the upstream update source. For more information, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point.

When software updates synchronization is initiated on a configured schedule, the active software update point on the central administration site (or stand-alone primary site) will initiate synchronization with Microsoft Update at the scheduled date and time. The custom schedule allows you to synchronize software updates on a date and time when the demands from the WSUS server, site server, and network are low, such as every week at 2:00 AM. A full synchronization is performed during the scheduled synchronization and all changes to the software updates metadata since the last scheduled synchronization are inserted into the site database. This includes new software updates metadata or metadata that has been modified, removed, or is now expired. After synchronization with Microsoft Update is complete, a synchronization request is sent to any active software update points on child primary or secondary sites. You can also manually initiate software updates synchronization on the central administration site or stand-alone primary site in the Configuration Manager 2012 console from the Software Library workspace.

Use the following procedures on the central administration site or stand-alone primary site to schedule or manually initiate software updates synchronization.

To schedule software updates synchronization

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, expand Site Operations, and then click Sites.

  3. In the results pane, click the central administration site or stand-alone primary site.

  4. On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point.

  5. In the Software Update Point Component Properties dialog box, select Enable synchronization on a schedule, and then specify the synchronization schedule.

To manually initiate software updates synchronization

  1. In the Configuration Manager console connected to the central administration site or stand-alone primary site, click Software Library.

  2. In the Software Library workspace, expand Software Updates, and click All Software Updates or Software Update Groups.

  3. On the Home tab, in the Create group, click Synchronize Software Updates. Click Yes in the dialog box to confirm that you want to initiate the synchronization process.

 

After you initiate the synchronization process on the software update point, you can monitor the synchronization process from the Configuration Manager console for all software update points in your hierarchy. Use the following procedure to monitor the software updates synchronization process.

To monitor the software updates synchronization process

  1. In the Configuration Manager console, click Monitoring.

  2. In the Monitoring workspace, click Software Update Point Synchronization Status.

    The software update points in your Configuration Manager 2012 hierarchy are displayed in the results pane. From this view, you can monitor the synchronization status for all software update points. When you want more detailed information about the synchronization process, you can review the wsyncmgr.log file located in <ConfigMgrInstallationPath>\Logs on each site server.

Top of page

Synchronize Software Updates from a Disconnected Software Update Point

When the software update point for the central administration site or stand-alone primary site is disconnected from the Internet, or when an Internet-based software update point is disconnected from the active software update point for the site, you must use the export and import functions of the WSUSUtil tool to synchronize software updates metadata. You will export software updates metadata from the WSUS database on a specified export server, copy locally stored license terms files to the disconnected software update point, and then import the software updates metadata to the WSUS database on the disconnected software update point. Use the following table to help you identify the export server in which to export the software updates metadata.

 

Software Update Point Upstream Update Source for Connected Software Update Points Export Server for a Disconnected Software Update Point

Central administration site

Microsoft Update (Internet)

Choose a WSUS server that has synchronized with Microsoft Update using the software update classifications, products, and languages that you need in your Configuration Manager 2012 environment.

Stand-alone primary site

Microsoft Update (Internet)

Choose a WSUS server that has synchronized with Microsoft Update using the software update classifications, products, and languages that you need in your Configuration Manager 2012 environment.

Remote Internet-based software update point

Active software update point for the site

You should choose the software update point for the central administration site or the active software update point for the same site as the export server, if possible.

However, you can choose any other software update point in the Configuration Manager 2012 hierarchy as long as it contains the most recent software updates.

Before you start the export process, you should verify that software updates synchronization has completed on the selected export server to ensure that the most recent software updates metadata is synchronized. To verify that software updates synchronization has completed successfully, use the following procedure.

To verify that software updates synchronization has completed successfully on the export server

  1. Open the WSUS Administration console and connect to the WSUS database on the export server.

  2. In the WSUS Administration console, click Synchronizations. A list of the software updates synchronization attempts are displayed in the results pane.

  3. In the results pane, find the latest software updates synchronization attempt and verify that it completed successfully.

ImportantImportant
The WSUSUtil tool must be run locally on the export server to export the software updates metadata and on the disconnected software update point server to import the software updates metadata. In addition, the user running the WSUSUtil tool must be a member of the local Administrators group on each server.

Export Process for Software Updates

The export process for software updates consists of two main steps; one to copy locally stored license terms files to the disconnected software update point and one to export software updates metadata from the WSUS database on the export server.

Use the following procedure to copy the local license terms metadata to the disconnected software update point.

To copy local files from the export server to the disconnected software update point server

  1. On the export server, navigate to the folder where software updates and the license terms for software updates are stored. By default, WSUS stores the files at <WSUSInstallationDrive>\WSUS\WSUSContent\, where WSUSInstallationDrive is the drive on which WSUS is installed.

  2. Copy all files and folders from this location to the WSUSContent folder on the disconnected software update point server.

Use the following procedure to export the software updates metadata from the WSUS database on the export server.

To export software updates metadata from the WSUS database on the export server

  1. At the command prompt on the export server, navigate to the folder that contains WSUSutil.exe. By default, the tool is located at %ProgramFiles%\Update Services\Tools. For example, if the tool is located in the default location, type cd %ProgramFiles%\Update Services\Tools.

  2. Type the following to export the software updates metadata to a package file:

    wsusutil.exe export packagename logfile

    For example:

    wsusutil.exe export export.cab export.log

    The format can be summarized as follows: WSUSutil.exe is followed by the export option, the name of export .cab file created during the export operation, and the name of a log file. WSUSutil.exe exports the metadata from the export server and creates a log file of the operation.

    noteNote
    The package (.cab file) and log file name must be unique in the current folder.
  3. Move the export package to the folder that contains WSUSutil.exe on the import WSUS server.

    noteNote
    Moving the package to this folder provides an easy import experience. You can move the package to any location accessible to the import server, and then specify the location when running WSUSutil.exe.

Import Software Updates Metadata

Use the following procedure to import software updates metadata from the export server to the disconnected software update point.

ImportantImportant
Never import exported data from a source that you do not trust. Importing content from a source you do not trust might compromise the security of your WSUS server.

To import metadata to the database of the import server

  1. At the command prompt on the import WSUS server, navigate to the folder that contains WSUSutil.exe. By default, the tool is located at %ProgramFiles%\Update Services\Tools.

  2. Type the following:

    wsusutil.exe import packagename logfile

    For example:

    wsusutil.exe import export.cab import.log

    The format can be summarized as follows: WSUSutil.exe is followed by the import command, the name of package file (.cab) created during the export operation (and path to the package file if it is in a different folder), and the name of a log file. WSUSutil.exe imports the metadata from the export server and creates a log file of the operation.

Top of page

There are client settings and group policy configurations that have an impact on software updates. This section provides information about how to verify or change the default settings associated with software updates.

Configure Software Updates Client Agent Settings

After you install the software update point, the software updates client agent is enabled by default and you are not required to configure any specific client agent settings, but you should review the settings to ensure that the default values meet your needs. Use the following procedure to review and configure the client agent settings associated with software updates.

To configure client agent settings

  1. In the Configuration Manager console, click Administration.

  2. In the Administration workspace, click Client Settings.

  3. Click Default Client Agent Settings or the custom settings object that you want to configure.

  4. On the Home tab, in the Properties group, click Properties.

  5. In the client agent settings dialog box, click Software Updates. The client agent settings for software updates are displayed.

    • Computer Agent: Verify that the device settings are configured with appropriate default values.

    • Computer Restart: Verify that the restart countdown interval is configured with appropriate default values.

    • Network Access Protection (NAP): Specify whether to enable NAP on clients.

      noteNote
      Enabling the Network Access Protection client agent makes it possible for Configuration Manager 2012 clients that support NAP and are assigned to this site to evaluate software updates for their statement of health. Configuration Manager 2012can also monitor clients that are in remediation for any NAP policy defined on the Network Policy Server. If you do not have a System Health Validator point for computers in this site, non-compliant computers in this site cannot have Configuration Manager NAP policies enforced and cannot be restricted through Network Access Protection. Before enabling Network Access Protection, ensure that clients have the Windows Network Access Protection Agent service started and set to automatic, and that the Windows Network Access Protection infrastructure is in place.
    • Software Updates: Verify the default software update client settings.

Group Policy Settings

The following Group Policy settings are required for the Windows Update Agent (WUA) on client computers to connect to WSUS on the active software updates point and successfully scan for software update compliance.

Specify Intranet Microsoft Update Service Location Local Policy

When the active software update point is created for a site, clients receive a machine policy that provides the active software update point server name and configures the Specify intranet Microsoft update service location local policy on the computer. The WUA retrieves the server name specified in the Set the intranet update service for detecting updates setting, and then connects to this server when it scans for software updates compliance. When a domain policy has been created for the Specify intranet Microsoft update service location setting, it overrides the local policy, and the WUA might connect to a server other than the active software update point. If this happens, the client might scan for software update compliance based on different products, classifications, and languages. Therefore, we recommend that you do not configure the domain policy for client computers.

Allow Signed Content from Intranet Microsoft Update Service Location Group Policy

Before the WUA on computers will scan for software updates that were created and published using System Center Updates Publisher, the Allow signed content from intranet Microsoft update service location Group Policy setting must be enabled. When the policy setting is enabled, WUA will accept software updates received through an intranet location if the software updates are signed in the Trusted Publishers certificate store on the local computer. For more information about the Group Policy settings required for Updates Publisher, see the Updates Publisher help file.

Top of page

Concepts