Before software update compliance assessment data is displayed in the Configuration Manager 2012console and before you can deploy software updates to client computers, you must install and configure a software update point, synchronize the software updates metadata, and verify the configuration for settings associated with software updates.
When you have a Configuration Manager 2012 hierarchy, you should install and configure the software update point at the central administration site first, and then install and configure the software update points on other sites. Some settings are only available when you configure the software update point on a central administration site, or stand-alone primary site, and there are different options that you must consider depending on where the software update point is installed. Use the steps in the following table to install and configure the software update point, synchronize software updates, and configure the setting associated with software updates.
Use the following steps and the procedures in this topic to configure software updates in Configuration Manager 2012.
Step | Details | More Information |
---|---|---|
Step 1: Install and Configure a Software Update Point |
Central administration site When you have a Configuration Manager 2012 hierarchy, install and configure the software update point on the central administration site before you install it on child primary sites and secondary sites. To enable software update in the hierarchy, you must have an active software update point on the central administration site. |
For more information, see the following procedure in this topic: Install and Configure a Software Update Point on the Central Administration Site. |
Stand-alone primary site When you have a stand-alone primary site, a primary site that is not connected to a central administration site, install and configure the software update point to enable software update deployment at the site. When you have a secondary site connected to the stand-alone primary site, you must install the software update point on the primary site first. |
For more information, see the following procedure in this topic: Install and Configure a Software Update Point on a Stand-Alone Primary Site. |
|
Child primary site After you install a software update point on the central administration site, install and configure the software update point on child primary sites to enable software update deployment at the site. When you have a secondary site connected to the primary site, you must install the software update point on the primary site first. |
For more information, see the following procedure in this topic: Install and Configure a Software Update Point on a Child Primary Site. |
|
Secondary site After you install the software update point on a primary site, you can optionally install and configure the software update point on a connected secondary site. When you do not have a software update point installed at the secondary site, clients assigned to the secondary site will use the software update point at the parent primary site. When there is limited network bandwidth to the software update point at the parent primary site or when Windows Server Update Services (WSUS) is approaching the maximum number of client computers at the parent primary site, you should install a software update point at the secondary site. |
For more information, see the following procedure in this topic: Install and Configure a Software Update Point on a Secondary Site. |
|
Step 2: Synchronize Software Updates |
Synchronize software updates on a connected software update point Software updates synchronization is the process of retrieving software updates metadata from Microsoft Update and replicating the metadata to all sites enabled for software updates in the Configuration Manager 2012hierarchy. The software update point on the central administration site, or on a stand-alone primary site, retrieves software updates metadata from Microsoft Update. Child primary sites, secondary sites, and remote Internet-based software update points retrieve the software updates metadata from the software update point identified as the upstream update source. Access to the upstream update source is required to successfully synchronize software updates. |
For more information, see the following procedure in this topic: Synchronize Software Updates. |
Synchronize software updates on a disconnected software update point Automatic software updates synchronization is not possible when the software update point for the central administration site or stand-alone primary site is disconnected from the Internet, or when an Internet-based software update point is disconnected from the active software update point for the site. To retrieve the latest software updates for a disconnected software update point, you must use the WSUSUtil tool to export the software updates metadata and license terms files from a software update source, and then import the metadata and files to the disconnected software update point. |
For more information, see the following procedure in this topic: Synchronize Software Updates on a Disconnected Software Update Point. |
|
Step 3: Configure the Settings Associated with Software Updates |
There are several Configuration Manager 2012 client settings and group policy configurations that are associated with software updates. Review these settings and configurations to verify that they are appropriate for your environment. |
For more information, see the following procedures in this topic: Configure the Settings Associated with Software Updates. |
In a Configuration Manager 2012 hierarchy, you should always install and configure the software update point starting with the central administration site. The software update point at the central administration site is typically configured to synchronize with Microsoft Update, retrieving the software updates metadata based on the criteria that you specify in the software update point properties. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure the central administration site. For more information about planning for software updates and to determine your software update point infrastructure, see Planning for Software Updates in Configuration Manager 2012.
Use the following procedure to add the software update point site system role to the central administration site.
Note |
---|
Do not use this procedure when you have decided to configure the software update point to use an NLB cluster. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. |
To install and configure the software update point for the central administration site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations and click Servers and Site System Roles.
-
Add the software update point site system role to a new or existing site system server by using the associated step:
- New site system server: On the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
- Existing site system server: Click the server
in which you want to install the software update point site system
role. When you click a server, a list of the site system roles that
are already installed on the server are displayed in the details
pane.
On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.
- New site system server: On the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
-
On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.
-
On the System Role Selection page, select Software update point from the list of available roles, and then click Next.
-
On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.
-
On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.
Tip To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS. -
On the Synchronization Source page, select Synchronize from Microsoft Update to synchronize software updates from Microsoft Update. The central administration site must have Internet access or synchronization will fail. This setting is available only when configuring the software update point on the central administration site or stand-alone primary site.
Important When the software update point on the central administration site is disconnected from the Internet, you must select Do not synchronize from Microsoft Update and manually synchronize software updates. For more information, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point. -
Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.
-
On the Synchronization Schedule page, specify whether to synchronize software updates on a schedule. This setting is configured only on the software update point for the central administration site.
Tip You should schedule software updates synchronization to run using a timeframe appropriate for your environment. One common scenario is to set the software updates synchronization schedule to run shortly after Microsoft’s regular security update release on the second Tuesday of each month, typically referred to as Patch Tuesday. Note When you choose not to enable software updates synchronization on a schedule, you can manually synchronize software updates from the All Software Updates or Software Update Groups node in the Software Library workspace. For more information, see the following section in this topic: Software Updates Synchronization. -
Specify whether to create an alert when synchronization fails, and then click Next. When selected, you can go to the Software Update Point Synchronization Status node in the Monitoring workspace to monitor the synchronization state for all software update points in your hierarchy.
-
On the Supersedence Rules page, specify how to manage superseded software updates, and then click Next. This setting is configured only on the software update point for the central administration site.
Note Typically, a software update that supersedes another software update does one or more of the following: - Enhances, improves, or adds to the fix
provided by one or more previously released updates.
- Improves the efficiency of its update file
package, which is installed on client computers if the update is
approved for installation. For example, the superseded update might
contain files that are no longer relevant to the fix or to the
operating systems now supported by the new update, so those files
are not included in the superseding update's file package.
- Updates newer versions of a product, or in
other words, is no longer applicable to older versions or
configurations of a product. Updates can also supersede other
updates if modifications have been made to expand language support.
For example, a later revision of a product update for Microsoft
Office might remove support for an older operating system, but add
additional support for new languages in the initial update
release.
- If a superseding software update supports
only newer versions of an operating system, and some of your client
computers run earlier versions of the operating system.
- If a superseding software update has more
restricted applicability than the software update it supersedes,
which would make it inappropriate for some client computers.
- If a superseding software update has not been
approved for deployment in your production environment.
- Enhances, improves, or adds to the fix
provided by one or more previously released updates.
-
On the Classifications page, specify the software update classifications for which you want to synchronize software updates, and then click Next. This setting is configured only for the software update point at the central administration site.
Note Every software update is defined with an update classification that helps to organize the software update and better define the type software updates you want to synchronize. During the synchronization process, the software updates metadata for the classifications that you specify will be synchronized. Configuration Manager 2012 provides the ability to synchronize software updates with the following software update classifications: - Critical Updates: Specifies a broadly
released update for a specific problem that addresses a critical,
non security-related bug.
- Definition Updates: Specifies an update to
virus or other definition files.
- Feature Packs: Specifies new product features
that are distributed outside of a product release and typically
included in the next full product release.
- Security Updates: Specifies a broadly
released update for a product-specific, security-related issue.
- Service Packs: Specifies a cumulative set of
hotfixes that are applied to an application. These hotfixes can
include security updates, critical updates, software updates, and
so on.
- Tools: Specifies a utility or feature that
helps to complete one or more tasks.
- Update Rollups: Specifies a cumulative set of
hotfixes that are packaged together for easy deployment. These
hotfixes can include security updates, critical updates, updates,
and so on. An update rollup generally addresses a specific area,
such as security or a product component.
- Updates: Specifies an update to an
application or file currently installed.
- Critical Updates: Specifies a broadly
released update for a specific problem that addresses a critical,
non security-related bug.
-
On the Products page, specify the products for which you want to synchronize software updates, and then click Next. This setting is configured only on the software update point for the central administration site.
Note The metadata for each software update defines what product or products the software update is applicable. A product is a specific edition of an operating system or application, for example, Windows Server 2008. A product family is the base operating system or application from which the individual products are derived. An example of a product family is Windows, of which Windows Server 2008 is a member. You can specify a product family or individual products within a product family. When software updates are applicable to multiple products, and at least one of the products has been selected for synchronization, all of the products will appear in the Configuration Manager console even if some have not been selected. For example, if Windows Server 2008 is the only operating system that you have selected, and if a software update applies to Windows 7 and Windows Server 2008, both products will be displayed in the Configuration Manager console. The more products that you select, the longer it will take to synchronize software updates. -
On the Languages page, specify the languages for which you want to synchronize software update files and summary details, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. The Summary Details settings are configured only on the software update point for the central administration site.
Note You can specify the languages for software update files and summary details. - Software Update File
The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default on the Language Selection page of the wizard and can be modified as necessary.
- Summary Details
The summary details information is the metadata for software updates. The metadata provides the information about the software update, such as name, description, products that the update supports, update classification, article ID, download URL, applicability rules, and so on. When you select the summary details languages, select only the languages needed in your environment. The software updates metadata is displayed in the locale of the operating system where the Configuration Manager 2012 console is running. If the localized properties for the software updates are not available, the information displays in English.
The more languages you select for summary details, the longer it will take to synchronize software updates.
Important Select all of the summary details languages that will be needed in your Configuration Manager 2012 hierarchy before you run software updates synchronization for the first time. Though you can change the summary details languages after the software update point is synchronized on the central administration site, the metadata in the new languages will not be retrieved for software updates that have already been synchronized unless there is an updated version for the software update available.
- Software Update File
-
On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.
-
To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.
After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:
- Client connection settings: The client
connection settings allow you to configure custom ports, whether
the software update point accepts communications from clients on
the Internet, and to enable SSL communications for the WSUS server.
During the initial software update point installation, you selected
a standard set of ports, the software update point is configured to
accept communications from only clients on the intranet, and SSL
communications is not enabled.
- Internet-based software update point: When
the active software update point is configured not to accept
communications from clients on the Internet, you can specify an
Internet-based software update point that is accessible from
clients on the Internet.
- Network Load Balancing (NLB): You can
configure the active software update point or Internet-based
software update point to use an NLB cluster. When you decide to use
NLB for a software update point, there are additional steps that
you must perform before you configure the software update point.
For more information, see How to
Configure a Software Update Point to Use Network Load Balancing
(NLB) Cluster.
When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the central administration site.
To complete software update point configuration on the central administration site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations, click Sites, and then select the central administration site.
-
On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. Software Update Point Component Properties opens.
-
On the General tab, configure the following settings:
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
Note This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server.
Note The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server.
Warning When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point. - Active software update point: Specifies the
name of the remote site system server that you selected as the
active software update point.
Note This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point. - Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Allow intranet-only client connections:
Specifies that this software update point accepts only connections
from clients on the intranet. When you select this setting, the
options on the Internet-based tab are enabled and provide you with
the option to configure a different remote software update point
that accepts connections from clients on the Internet.
- Allow both intranet and internet client
connections: Specifies that this software update point accepts
connections from both clients on the intranet and Internet. When
this setting is selected, the settings on the Internet-based tab
are disabled.
Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:
- The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- For clients to connect to the WSUS server,
both the clients and WSUS Web site must have a trusted root CA in
common. Without a common certificate, clients will fail to scan for
software update compliance..
Important When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN. - The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
-
On the Internet-based tab, configure the following settings:
Note The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab. - Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
Note When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server. The site server uses this port when
communicating with the WSUS server. This setting was configured
when you installed the software update point.
Tip For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server. When the Enable SSL for
this WSUS server setting is enabled, software updates uses this
port when synchronizing software updates with the WSUS server. This
setting was configured when you installed the software update
point.
- Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Do not synchronize from the software update
point located on the intranet: Specifies that the Internet-based
software update point does not synchronize with the active software
update point. Select this option if the Internet-based software
update point is disconnected from the active software update point.
For more information about synchronizing software updates on a
disconnected software updates point, see the following procedure in
this topic: Synchronize Software
Updates from a Disconnected Software Update Point.
Important Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
- Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
-
Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 10-15 in the preceding procedure.
The software update point site system role must be installed, configured, and set to active before you can assess software updates compliance or deploy software updates assigned to the stand-alone primary site. The software update point on a stand-alone primary site is typically configured to synchronize with Microsoft Update, retrieving the software updates metadata for the criteria that you specify in the software update point properties. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure for your site. For example, are you going to install the software update point on the local site server or a remote site system server, will you install an Internet-based software update point to accept communications from clients on the Internet, or should you configure the software update point to use Network Load Balancing (NLB). For more information about planning for software updates, see Planning for Software Updates in Configuration Manager 2012.
Use the following procedure to install and configure the software update point on a stand-alone primary site.
To install and configure the software update point for a stand-alone primary site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations and click Servers and Site System Roles.
-
Add the software update point site system role to a new or existing site system server by using the associated step:
- New site system server: on the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
- Existing site system server: click the server
in which you want to install the software update point site role.
When you click a server, a list of the site system roles that are
already installed on the server are displayed in the details
pane.
On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.
- New site system server: on the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
-
On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.
-
On the System Role Selection page, select Software update point from the list of available roles, and then click Next.
-
On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.
-
On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.
Tip To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS. -
On the Synchronization Source page, select Synchronize from Microsoft Update to synchronize software updates from Microsoft Update. The stand-alone primary site must have Internet access or synchronization will fail. This setting is available only when configuring the software update point on the central administration site or stand-alone primary site.
Important When the software update point on the stand-alone primary site is disconnected from the Internet, you must select Do not synchronize from Microsoft Update and manually synchronize software updates. For more information, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point. Note When there is a firewall between the active software update point and the Internet, the firewall might need to be configured to accept the HTTP and HTTPS ports used for the WSUS Web site. You can also choose to restrict access on the firewall to limited domains. For more information about configuring your firewall to support software updates, see How to Configure a Firewall for Software Updates. -
Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.
-
On the Synchronization Schedule page, specify whether to synchronize software updates on a schedule. This setting is configured only on the software update point for the stand-alone primary site.
Tip You should schedule software updates synchronization to run using a timeframe appropriate for your environment. One common scenario is to set the software updates synchronization schedule to run shortly after Microsoft’s regular security update release on the second Tuesday of each month, typically referred to as Patch Tuesday. Note When you choose not to enable software updates synchronization on a schedule, you can manually synchronize software updates from the All Software Updates or Software Update Groups node in the Software Library workspace. For more information, see the following section in this topic: Software Updates Synchronization. -
Specify whether to create an alert when synchronization fails, and then click Next. When selected, you can go to the Software Update Point Synchronization Status node in the Monitoring workspace to monitor the synchronization state for all software update points in your hierarchy.
-
On the Supersedence Rules page, specify how to manage superseded software updates, and then click Next. This setting is configured only on the software update point for the stand-alone primary site.
Note Typically, a software update that supersedes another software update does one or more of the following: - Enhances, improves, or adds to the fix
provided by one or more previously released updates.
- Improves the efficiency of its update file
package, which is installed on client computers if the update is
approved for installation. For example, the superseded update might
contain files that are no longer relevant to the fix or to the
operating systems now supported by the new update, so those files
are not included in the superseding update's file package.
- Updates newer versions of a product, or in
other words, is no longer applicable to older versions or
configurations of a product. Updates can also supersede other
updates if modifications have been made to expand language support.
For example, a later revision of a product update for Microsoft
Office might remove support for an older operating system, but add
additional support for new languages in the initial update
release.
- If a superseding software update supports
only newer versions of an operating system, and some of your client
computers run earlier versions of the operating system.
- If a superseding software update has more
restricted applicability than the software update it supersedes,
which would make it inappropriate for some client computers.
- If a superseding software update has not been
approved for deployment in your production environment.
- Enhances, improves, or adds to the fix
provided by one or more previously released updates.
-
On the Classifications page, specify the software update classifications for which you want to synchronize software updates, and then click Next. Secondary sites will automatically use the software update classifications configured for the software update point for the stand-alone primary site.
Note Every software update is defined with an update classification that helps to organize the different types of updates. During the synchronization process, the software updates metadata for the specified classifications will be synchronized. Configuration Manager 2012 provides the ability to synchronize software updates with the following update classifications: - Critical Updates: Specifies a broadly
released update for a specific problem that addresses a critical,
non security-related bug.
- Definition Updates: Specifies an update to
virus or other definition files.
- Feature Packs: Specifies new product features
that are distributed outside of a product release and typically
included in the next full product release.
- Security Updates: Specifies a broadly
released update for a product-specific, security-related issue.
- Service Packs: Specifies a cumulative set of
hotfixes that are applied to an application. These hotfixes can
include security updates, critical updates, software updates, and
so on.
- Tools: Specifies a utility or feature that
helps to complete one or more tasks.
- Update Rollups: Specifies a cumulative set of
hotfixes that are packaged together for easy deployment. These
hotfixes can include security updates, critical updates, updates,
and so on. An update rollup generally addresses a specific area,
such as security or a product component.
- Updates: Specifies an update to an
application or file currently installed.
- Critical Updates: Specifies a broadly
released update for a specific problem that addresses a critical,
non security-related bug.
-
On the Products page, specify the products for which you want to synchronize software updates, and then click Next. Secondary sites will automatically use the products configured for the software update point for the stand-alone primary site.
When selecting the products, be aware that the more products that are selected, the longer it takes to complete software updates synchronization.
Note The metadata for each software update defines what product or products for which the update is applicable. A product is a specific edition of an operating system or application, for example, Windows Server 2008. A product family is the base operating system or application from which the individual products are derived. An example of a product family is Windows, of which Windows Server 2008 is a member. You can specify a product family or individual products within a product family. When software updates are applicable to multiple products, and at least one of the products has been selected for synchronization, all of the products will appear in the Configuration Manager console even if some have not been selected. For example, if Windows Server 2008 is the only operating system that you have selected, and if a software update applies to Windows 7 and Windows Server 2008, both products will be displayed in the Configuration Manager console. The more products that you select, the longer it will take to synchronize software updates. -
On the Languages page, specify the languages for which you want to synchronize software update files and summary details, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. Secondary sites will automatically use the summary details configured for the software update point for the stand-alone primary site.
Note - Software Update File
The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default on the Language Selection page of the wizard and can be modified as necessary.
- Summary Details
The summary details information is the metadata for software updates. The metadata provides the information about the software update, such as name, description, products that the update supports, update classification, article ID, download URL, applicability rules, and so on. When you select the summary details languages, select only the languages needed in your environment. The more languages that you select, the longer it will take to synchronize software updates. The software updates metadata is displayed in the locale of the operating system where the Configuration Manager 2012 console is running. If the localized properties for the software updates are not available, the information displays in English.
Important Select all of the summary details languages that will be needed for your Configuration Manager 2012 site before you run software updates synchronization for the first time. Though you can change the summary details languages after the software update point is synchronized on the stand-along primary site, the metadata in the new languages will not be retrieved for software updates that have already been synchronized unless there is an updated version for the software update available.
- Software Update File
-
On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.
-
To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.
After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:
- Client connection settings: The client
connection settings allow you to configure custom ports, whether
the software update point accepts communications from clients on
the Internet, and to enable SSL communications for the WSUS server.
During the initial software update point installation, you selected
a standard set of ports, the software update point is configured to
accept communications from only clients on the intranet, and SSL
communications is not enabled.
- Internet-based software update point: When
the active software update point is configured not to accept
communications from clients on the Internet, you can specify an
Internet-based software update point that is accessible from
clients on the Internet.
- Network Load Balancing (NLB): You can
configure the active software update point or Internet-based
software update point to use an NLB cluster. When you decide to use
NLB for a software update point, there are additional steps that
you must perform before you configure the software update point.
For more information, see How to
Configure a Software Update Point to Use Network Load Balancing
(NLB) Cluster.
When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the central administration site.
To complete software update point configuration on the stand-alone primary site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations, click Sites, and then select the central administration site.
-
On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. The Software Update Point Component Properties opens.
-
On the General tab, configure the following settings:
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
Note This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server.
Note The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server.
Warning When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point. - Active software update point: Specifies the
name of the remote site system server that you selected as the
active software update point.
Note This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point. - Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Allow intranet-only client connections:
Specifies that this software update point accepts only connections
from clients on the intranet. When you select this setting, the
options on the Internet-based tab are enabled and provide you with
the option to configure a different remote software update point
that accepts connections from clients on the Internet.
- Allow both intranet and internet client
connections: Specifies that this software update point accepts
connections from both clients on the intranet and Internet. When
this setting is selected, the settings on the Internet-based tab
are disabled.
Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:
- The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- For clients to connect to the WSUS server,
both the clients and WSUS Web site must have a trusted root CA in
common. Without a common certificate, clients will fail to scan for
software update compliance..
Important When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN. - The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
-
On the Internet-based tab, configure the following settings:
Note The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab. - Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
Note When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server. The site server uses this port when
communicating with the WSUS server. This setting was configured
when you installed the software update point.
Tip For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server. When the Enable SSL for
this WSUS server setting is enabled, software updates uses this
port when synchronizing software updates with the WSUS server. This
setting was configured when you installed the software update
point.
- Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Do not synchronize from the software update
point located on the intranet: Specifies that the Internet-based
software update point does not synchronize with the active software
update point. Select this option if the Internet-based software
update point is disconnected from the active software update point.
For more information about synchronizing software updates on a
disconnected software updates point, see the following procedure in
this topic: Synchronize Software
Updates from a Disconnected Software Update Point.
Important Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
- Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
-
Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 10-15 in the preceding procedure.
In a Configuration Manager 2012 hierarchy, you should always install and configure the software update point on child primary sites after the software update point has been installed and configured for the central administration site. The software update point site system role must be installed, configured, and set to active before you can assess software updates compliance or deploy software updates assigned to the child primary site. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure for your site. For example, are you going to install the software update point on the local site server or a remote site system server, will you install an Internet-based software update point to accept communications from clients on the Internet, or should you configure the software update point to use Network Load Balancing (NLB). For more information about planning for software updates, see Planning for Software Updates in Configuration Manager 2012.
Use the following procedure to install and configure the software update point on a child primary site.
To install and configure the software update point for a child primary site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations and click Servers and Site System Roles.
-
Add the software update point site system role to a new or existing site system server by using the associated step:
- New site system server: on the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
- Existing site system server: click the server
in which you want to install the software update point site role.
When you click a server, a list of the site system roles that are
already installed on the server are displayed in the details
pane.
On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.
- New site system server: on the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
-
On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.
-
On the System Role Selection page, select Software update point from the list of available roles, and then click Next.
-
On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.
-
On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.
Tip To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS. -
On the Synchronization Source page, Synchronize from an upstream update server is automatically selected to synchronize software updates from the software update point at the central administration site. The child primary site must have access to the software update point on the central administration site or synchronization will fail. The Synchronize from Microsoft Update and Do not synchronize from Microsoft Update settings are available only when configuring the software update point on the central administration site or stand-alone primary site.
-
Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.
-
On the Languages page, specify the languages for which you want to synchronize software update files, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. Child primary sites will automatically use the summary details (metadata about the software updates) configured for the software update point at the central administration site.
Note The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default and can be modified as necessary. -
On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.
-
To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.
After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:
- Client connection settings: The client
connection settings allow you to configure custom ports, whether
the software update point accepts communications from clients on
the Internet, and to enable SSL communications for the WSUS server.
During the initial software update point installation, you selected
a standard set of ports, the software update point is configured to
accept communications from only clients on the intranet, and SSL
communications is not enabled.
- Internet-based software update point: When
the active software update point is configured not to accept
communications from clients on the Internet, you can specify an
Internet-based software update point that is accessible from
clients on the Internet.
- Network Load Balancing (NLB): You can
configure the active software update point or Internet-based
software update point to use an NLB cluster. When you decide to use
NLB for a software update point, there are additional steps that
you must perform before you configure the software update point.
For more information, see How to
Configure a Software Update Point to Use Network Load Balancing
(NLB) Cluster.
When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the child primary site.
To complete software update point configuration on the child primary site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations, click Sites, and then select the child primary site.
-
On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. The Software Update Point Component Properties opens.
-
On the General tab, configure the following settings:
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
Note This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point for the site and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server.
Note The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server.
Warning When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point. - Active software update point: Specifies the
name of the remote site system server that you selected as the
active software update point.
Note This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point. - Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Allow intranet-only client connections:
Specifies that this software update point accepts only connections
from clients on the intranet. When you select this setting, the
options on the Internet-based tab are enabled and provide you with
the option to configure a different remote software update point
that accepts connections from clients on the Internet.
- Allow both intranet and internet client
connections: Specifies that this software update point accepts
connections from both clients on the intranet and Internet. When
this setting is selected, the settings on the Internet-based tab
are disabled.
Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:
- The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- For clients to connect to the WSUS server,
both the clients and WSUS Web site must have a trusted root CA in
common. Without a common certificate, clients will fail to scan for
software update compliance..
Important When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN. - The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
-
On the Internet-based tab, configure the following settings:
Note The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab. - Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
Note When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server. The site server uses this port when
communicating with the WSUS server. This setting was configured
when you installed the software update point.
Tip For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server. When the Enable SSL for
this WSUS server setting is enabled, software updates uses this
port when synchronizing software updates with the WSUS server. This
setting was configured when you installed the software update
point.
- Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Do not synchronize from the software update
point located on the intranet: Specifies that the Internet-based
software update point does not synchronize with the active software
update point. Select this option if the Internet-based software
update point is disconnected from the active software update point.
For more information about synchronizing software updates on a
disconnected software updates point, see the following procedure in
this topic: Synchronize Software
Updates from a Disconnected Software Update Point.
Important Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
- Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
-
Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 8-10 in the preceding procedure.
In a Configuration Manager 2012 hierarchy, you should always install and configure the software update point on secondary sites after the software update point has been installed and configured for the parent primary site. Until you install a software update point at the secondary site, clients assigned to the secondary site will automatically use the software update point configured for the parent primary site. Before you install the software update point site system role, you must verify that the server meets required dependencies and you should determine the software update point infrastructure for your site. For example, are you going to install the software update point on the local site server or a remote site system server, will you install an Internet-based software update point to accept communications from clients on the Internet, or should you configure the software update point to use Network Load Balancing (NLB). For more information about planning for software updates, see Planning for Software Updates in Configuration Manager 2012.
Use the following procedure to install and configure the software update point on a secondary site.
To install and configure the software update point for a secondary site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations and click Servers and Site System Roles.
-
Add the software update point site system role to a new or existing site system server by using the associated step:
- New site system server: on the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
- Existing site system server: click the server
in which you want to install the software update point site role.
When you click a server, a list of the site system roles that are
already installed on the server are displayed in the details
pane.
On the Home tab, in the Server group, click Add Site System Role. The Create Roles Wizard opens.
- New site system server: on the Home tab, in
the Create group, click Create Site System Server. The Create
Server Wizard opens.
-
On the General page, specify the general settings for the site system server. When you add the software update point to an existing site system server, verify the values that were previously configured.
-
On the System Role Selection page, select Software update point from the list of available roles, and then click Next.
-
On the Software Update Point page, specify whether the site server will use a proxy server when connecting to the software update point and whether to use credentials to connect to the proxy server, and then click Next.
-
On the Active Settings page, select Use this server as the active software update point, specify the website and port configurations that are used by WSUS, and then click Next.
Tip To determine the website and port configurations in WSUS, see How to Determine the Port Settings Used by WSUS. -
On the Synchronization Source page, Synchronize from an upstream update server is automatically selected to synchronize software updates from the software update point at the parent primary site. The Synchronize from Microsoft Update and Do not synchronize from Microsoft Update settings are available only when configuring the software update point on the central administration site or stand-alone primary site.
-
Specify whether to create WSUS reporting events, and then click Next. Configuration Manager does not use these events so you will typically choose the default setting Do not create WSUS reporting events.
-
On the Languages page, specify the languages for which you want to synchronize software update files, and then click Next. The Software Update File setting is configured at each software update point in the Configuration Manager 2012 hierarchy. Secondary sites will automatically use the summary details (metadata about the software updates) configured for the software update point at the central administration site.
Note The languages configured for the Software Update File setting provide the default set of languages that will be available when downloading software updates at the site. You should configure the software update file language settings with the languages that are most often used in your environment. For example, if client computers in the site use mostly English and Japanese languages for the operating system or applications, and there are very few other languages used at the site, select English and Japanese in the Software Update File column and clear the other languages. Later, when you download or deploy software updates, the languages will automatically be selected by default on the Language Selection page of the wizard and can be modified as necessary. -
On the Summary page, confirm the settings for the software update point. You can go back to previous pages and make changes. Click Next to add the site system role, verify that the wizard successfully completed, and then click Close to exit the wizard.
-
To monitor the installation progress for the software update point, open SUPSetup.log in <InstallationPath>\Logs. When the installation completes, Installation was successful is written to the log file.
After you complete the software update point installation on the site system server, consider the following additional settings available only from Software Update Point Component Properties:
- Client connection settings: The client
connection settings allow you to configure custom ports, whether
the software update point accepts communications from clients on
the Internet, and to enable SSL communications for the WSUS server.
During the initial software update point installation, you selected
a standard set of ports, the software update point is configured to
accept communications from only clients on the intranet, and SSL
communications is not enabled.
- Internet-based software update point: When
the active software update point is configured not to accept
communications from clients on the Internet, you can specify an
Internet-based software update point that is accessible from
clients on the Internet.
- Network Load Balancing (NLB): You can
configure the active software update point or Internet-based
software update point to use an NLB cluster. When you decide to use
NLB for a software update point, there are additional steps that
you must perform before you configure the software update point.
For more information, see How to
Configure a Software Update Point to Use Network Load Balancing
(NLB) Cluster.
When one of the above configurations is necessary for your software update point, use the following procedure to complete the software update point configuration on the child primary site.
To complete software update point configuration on the secondary site
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations, click Sites, and then select the secondary site.
-
On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point. The Software Update Point Component Properties opens.
-
On the General tab, configure the following settings:
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
Note This setting was configured when you installed the software update point on the site server or site system server. You can change the location for the active software update point by using this setting. When the active software update point is installed on a remote site system server, the Active software update point for the site and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server.
Note The site server uses this port when communicating with the WSUS server. This setting was configured when you installed the software update point. For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server.
Warning When the Enable SSL for this WSUS server setting is selected, software updates uses this port when synchronizing software updates with the WSUS server. This setting was configured when you installed the software update point. - Active software update point: Specifies the
name of the remote site system server that you selected as the
active software update point.
Note This setting is only displayed when you installed the active software point on a remote site system server. You can select a different remote site system server for the active software update point by using this setting. Only remote site system servers with the software update point site system role installed are available for you to select. You can have only one active software update point for a site, but multiple site system servers can have the software update point site system role installed and be available to select as the active software update point. - Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Allow intranet-only client connections:
Specifies that this software update point accepts only connections
from clients on the intranet. When you select this setting, the
options on the Internet-based tab are enabled and provide you with
the option to configure a different remote software update point
that accepts connections from clients on the Internet.
- Allow both intranet and internet client
connections: Specifies that this software update point accepts
connections from both clients on the intranet and Internet. When
this setting is selected, the settings on the Internet-based tab
are disabled.
Enable SSL communications for the WSUS Server: Specifies whether to use SSL communications on the WSUS server. When this setting is selected, the following actions apply:
- The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- For clients to connect to the WSUS server,
both the clients and WSUS Web site must have a trusted root CA in
common. Without a common certificate, clients will fail to scan for
software update compliance..
Important When the active software update point is configured for SSL, and it is configured to accept both client connections from the Internet and intranet, the Web server certificate must contain both the Internet FQDN and the intranet FQDN. - The WSUS server will synchronize software
updates metadata using SSL. The upstream update server must be
configured for SSL or synchronization will fail.
- Active software update point for this site:
Specifies whether the active software update point is configured,
and if so, whether it is installed on the site server, a remote
site system server, or configured to use NLB.
-
On the Internet-based tab, configure the following settings:
Note The settings on the Internet-based tab are configurable only when the active software update point is configured for intranet-only client connections, where the Allow intranet-only client connections setting is selected on the General tab. - Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
Note When the active software update point only accepts communication from clients on the intranet and the Internet-based software update point is not configured, clients on the Internet will not scan for software updates compliance. When the active software update point is installed on a remote site system server, the Active server name and Software Update Point Connection Account settings are displayed on this page. Important When you decide to use NLB for a software update point, there are additional steps that you must perform before you configure the software update point. For more information, see How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster. - Port number: Specifies the HTTP port number
configured on the WSUS server. The site server uses this port when
communicating with the WSUS server. This setting was configured
when you installed the software update point.
Tip For information about finding the port numbers used by WSUS, see How to Determine the Port Settings Used by WSUS. - SSL port number: Specifies the SSL (HTTPS)
port number configured on the WSUS server. When the Enable SSL for
this WSUS server setting is enabled, software updates uses this
port when synchronizing software updates with the WSUS server. This
setting was configured when you installed the software update
point.
- Software Update Point Connection Account:
Specifies the account that is used by the site server when it
connects to a remote software update point or an active software
update point configured as an NLB cluster. When this account is not
specified, the computer account for the site server is used when
connecting to the software update point.
Important The account used to connect to the remote software update point must have local Administrator rights on the remote site system server computer. - Do not synchronize from the software update
point located on the intranet: Specifies that the Internet-based
software update point does not synchronize with the active software
update point. Select this option if the Internet-based software
update point is disconnected from the active software update point.
For more information about synchronizing software updates on a
disconnected software updates point, see the following procedure in
this topic: Synchronize Software
Updates from a Disconnected Software Update Point.
Important Even though the Internet-based software update point accepts client connections from the Internet only, the Web server certificate must contain both the Internet FQDN and the intranet FQDN.
- Internet-based software update point:
Specifies whether the Internet-based software update point is
configured, and if so, whether it is installed on a remote site
system server or configured to use NLB.
-
Review the settings on the remaining tabs that you configured as part of the software update point installation. For more information about the settings, refer to steps 8-10 in the preceding procedure.
Software updates synchronization in Configuration Manager 2012 is the process of retrieving the software updates metadata that meets the criteria that you configure. The software update point on the central administration site or stand-alone primary site retrieves the metadata from Microsoft Update on a schedule or you can manually initiate synchronization from the Configuration Manager console. For the synchronization process to complete successfully, the software update point must have access to its upstream update source. When the software update point is disconnected from the upstream update source, you must use the WSUSUtil tool to export software updates metadata from a software updates source and import the metadata to the disconnected software update point. The following table lists the software update point types and the upstream update source in which the software update point requires access.
Software Update Point | Upstream Update Source |
---|---|
Central administration site |
Microsoft Update (Internet) |
Stand-alone primary site |
Microsoft Update (Internet) |
Child primary site |
Central administration site |
Secondary site |
Parent primary site |
Remote Internet-based software update point |
Active software update point for the site |
Synchronize Software Updates from a Connected Software Update Point
Typically, the software update points in your Configuration Manager 2012 hierarchy will have access to the upstream update source. In this scenario, the software update point for the central administration site or stand-alone primary site will connect to the Internet and synchronize software updates from Microsoft Update, and then send a synchronization request to other sites to initiate the synchronization process. When the synchronization request is received at a site, the software update point for the site retrieves software updates metadata from the upstream update source.
Note |
---|
The software update point on child primary sites and secondary sites must be connected to the upstream update server to synchronize software updates. The software update point for the central administration site, or stand-alone primary site, and Internet-based software update points can use the export and import method for synchronizing software update when disconnected from the upstream update source. For more information, see the following procedure in this topic: Synchronize Software Updates from a Disconnected Software Update Point. |
When software updates synchronization is initiated on a configured schedule, the active software update point on the central administration site (or stand-alone primary site) will initiate synchronization with Microsoft Update at the scheduled date and time. The custom schedule allows you to synchronize software updates on a date and time when the demands from the WSUS server, site server, and network are low, such as every week at 2:00 AM. A full synchronization is performed during the scheduled synchronization and all changes to the software updates metadata since the last scheduled synchronization are inserted into the site database. This includes new software updates metadata or metadata that has been modified, removed, or is now expired. After synchronization with Microsoft Update is complete, a synchronization request is sent to any active software update points on child primary or secondary sites. You can also manually initiate software updates synchronization on the central administration site or stand-alone primary site in the Configuration Manager 2012 console from the Software Library workspace.
Use the following procedures on the central administration site or stand-alone primary site to schedule or manually initiate software updates synchronization.
To schedule software updates synchronization
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, expand Site Operations, and then click Sites.
-
In the results pane, click the central administration site or stand-alone primary site.
-
On the Home tab, in the Settings group, expand Configure Site Components, and then click Software Update Point.
-
In the Software Update Point Component Properties dialog box, select Enable synchronization on a schedule, and then specify the synchronization schedule.
To manually initiate software updates synchronization
-
In the Configuration Manager console connected to the central administration site or stand-alone primary site, click Software Library.
-
In the Software Library workspace, expand Software Updates, and click All Software Updates or Software Update Groups.
-
On the Home tab, in the Create group, click Synchronize Software Updates. Click Yes in the dialog box to confirm that you want to initiate the synchronization process.
After you initiate the synchronization process on the software update point, you can monitor the synchronization process from the Configuration Manager console for all software update points in your hierarchy. Use the following procedure to monitor the software updates synchronization process.
To monitor the software updates synchronization process
-
In the Configuration Manager console, click Monitoring.
-
In the Monitoring workspace, click Software Update Point Synchronization Status.
The software update points in your Configuration Manager 2012 hierarchy are displayed in the results pane. From this view, you can monitor the synchronization status for all software update points. When you want more detailed information about the synchronization process, you can review the wsyncmgr.log file located in <ConfigMgrInstallationPath>\Logs on each site server.
Synchronize Software Updates from a Disconnected Software Update Point
When the software update point for the central administration site or stand-alone primary site is disconnected from the Internet, or when an Internet-based software update point is disconnected from the active software update point for the site, you must use the export and import functions of the WSUSUtil tool to synchronize software updates metadata. You will export software updates metadata from the WSUS database on a specified export server, copy locally stored license terms files to the disconnected software update point, and then import the software updates metadata to the WSUS database on the disconnected software update point. Use the following table to help you identify the export server in which to export the software updates metadata.
Software Update Point | Upstream Update Source for Connected Software Update Points | Export Server for a Disconnected Software Update Point |
---|---|---|
Central administration site |
Microsoft Update (Internet) |
Choose a WSUS server that has synchronized with Microsoft Update using the software update classifications, products, and languages that you need in your Configuration Manager 2012 environment. |
Stand-alone primary site |
Microsoft Update (Internet) |
Choose a WSUS server that has synchronized with Microsoft Update using the software update classifications, products, and languages that you need in your Configuration Manager 2012 environment. |
Remote Internet-based software update point |
Active software update point for the site |
You should choose the software update point for the central administration site or the active software update point for the same site as the export server, if possible. However, you can choose any other software update point in the Configuration Manager 2012 hierarchy as long as it contains the most recent software updates. |
Before you start the export process, you should verify that software updates synchronization has completed on the selected export server to ensure that the most recent software updates metadata is synchronized. To verify that software updates synchronization has completed successfully, use the following procedure.
To verify that software updates synchronization has completed successfully on the export server
-
Open the WSUS Administration console and connect to the WSUS database on the export server.
-
In the WSUS Administration console, click Synchronizations. A list of the software updates synchronization attempts are displayed in the results pane.
-
In the results pane, find the latest software updates synchronization attempt and verify that it completed successfully.
Important |
---|
The WSUSUtil tool must be run locally on the export server to export the software updates metadata and on the disconnected software update point server to import the software updates metadata. In addition, the user running the WSUSUtil tool must be a member of the local Administrators group on each server. |
Export Process for Software Updates
The export process for software updates consists of two main steps; one to copy locally stored license terms files to the disconnected software update point and one to export software updates metadata from the WSUS database on the export server.
Use the following procedure to copy the local license terms metadata to the disconnected software update point.
To copy local files from the export server to the disconnected software update point server
-
On the export server, navigate to the folder where software updates and the license terms for software updates are stored. By default, WSUS stores the files at <WSUSInstallationDrive>\WSUS\WSUSContent\, where WSUSInstallationDrive is the drive on which WSUS is installed.
-
Copy all files and folders from this location to the WSUSContent folder on the disconnected software update point server.
Use the following procedure to export the software updates metadata from the WSUS database on the export server.
To export software updates metadata from the WSUS database on the export server
-
At the command prompt on the export server, navigate to the folder that contains WSUSutil.exe. By default, the tool is located at %ProgramFiles%\Update Services\Tools. For example, if the tool is located in the default location, type cd %ProgramFiles%\Update Services\Tools.
-
Type the following to export the software updates metadata to a package file:
wsusutil.exe export packagename logfile
For example:
wsusutil.exe export export.cab export.log
The format can be summarized as follows: WSUSutil.exe is followed by the export option, the name of export .cab file created during the export operation, and the name of a log file. WSUSutil.exe exports the metadata from the export server and creates a log file of the operation.
Note The package (.cab file) and log file name must be unique in the current folder. -
Move the export package to the folder that contains WSUSutil.exe on the import WSUS server.
Note Moving the package to this folder provides an easy import experience. You can move the package to any location accessible to the import server, and then specify the location when running WSUSutil.exe.
Import Software Updates Metadata
Use the following procedure to import software updates metadata from the export server to the disconnected software update point.
Important |
---|
Never import exported data from a source that you do not trust. Importing content from a source you do not trust might compromise the security of your WSUS server. |
To import metadata to the database of the import server
-
At the command prompt on the import WSUS server, navigate to the folder that contains WSUSutil.exe. By default, the tool is located at %ProgramFiles%\Update Services\Tools.
-
Type the following:
wsusutil.exe import packagename logfile
For example:
wsusutil.exe import export.cab import.log
The format can be summarized as follows: WSUSutil.exe is followed by the import command, the name of package file (.cab) created during the export operation (and path to the package file if it is in a different folder), and the name of a log file. WSUSutil.exe imports the metadata from the export server and creates a log file of the operation.
There are client settings and group policy configurations that have an impact on software updates. This section provides information about how to verify or change the default settings associated with software updates.
Configure Software Updates Client Agent Settings
After you install the software update point, the software updates client agent is enabled by default and you are not required to configure any specific client agent settings, but you should review the settings to ensure that the default values meet your needs. Use the following procedure to review and configure the client agent settings associated with software updates.
To configure client agent settings
-
In the Configuration Manager console, click Administration.
-
In the Administration workspace, click Client Settings.
-
Click Default Client Agent Settings or the custom settings object that you want to configure.
-
On the Home tab, in the Properties group, click Properties.
-
In the client agent settings dialog box, click Software Updates. The client agent settings for software updates are displayed.
- Computer Agent: Verify that the device
settings are configured with appropriate default values.
- Computer Restart: Verify that the restart
countdown interval is configured with appropriate default
values.
- Network Access Protection (NAP): Specify
whether to enable NAP on clients.
Note Enabling the Network Access Protection client agent makes it possible for Configuration Manager 2012 clients that support NAP and are assigned to this site to evaluate software updates for their statement of health. Configuration Manager 2012can also monitor clients that are in remediation for any NAP policy defined on the Network Policy Server. If you do not have a System Health Validator point for computers in this site, non-compliant computers in this site cannot have Configuration Manager NAP policies enforced and cannot be restricted through Network Access Protection. Before enabling Network Access Protection, ensure that clients have the Windows Network Access Protection Agent service started and set to automatic, and that the Windows Network Access Protection infrastructure is in place. - Software Updates: Verify the default software
update client settings.
- Computer Agent: Verify that the device
settings are configured with appropriate default values.
Group Policy Settings
The following Group Policy settings are required for the Windows Update Agent (WUA) on client computers to connect to WSUS on the active software updates point and successfully scan for software update compliance.
Specify Intranet Microsoft Update Service Location Local Policy
When the active software update point is created for a site, clients receive a machine policy that provides the active software update point server name and configures the Specify intranet Microsoft update service location local policy on the computer. The WUA retrieves the server name specified in the Set the intranet update service for detecting updates setting, and then connects to this server when it scans for software updates compliance. When a domain policy has been created for the Specify intranet Microsoft update service location setting, it overrides the local policy, and the WUA might connect to a server other than the active software update point. If this happens, the client might scan for software update compliance based on different products, classifications, and languages. Therefore, we recommend that you do not configure the domain policy for client computers.
Allow Signed Content from Intranet Microsoft Update Service Location Group Policy
Before the WUA on computers will scan for software updates that were created and published using System Center Updates Publisher, the Allow signed content from intranet Microsoft update service location Group Policy setting must be enabled. When the policy setting is enabled, WUA will accept software updates received through an intranet location if the software updates are signed in the Trusted Publishers certificate store on the local computer. For more information about the Group Policy settings required for Updates Publisher, see the Updates Publisher help file.