0% found this document useful (0 votes)
7 views8 pages

Patch Management Process

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

Patch Management Process

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Windows Update Agent (WU Agent) Behavior

The Windows Update Agent (WU Agent) is a fundamental component of the Windows operating system
that manages the update lifecycle. Its core responsibilities include detecting, downloading, installing,
and reporting updates. It interacts with update services such as Windows Server Update Services
(WSUS) or Microsoft Update to ensure devices remain secure, compliant, and up-to-date.

Key Functions of the WU Agent

1. Detection

 Automatic Scanning:

o The WU Agent performs periodic scans for updates at randomized intervals


(approximately every 22 hours). This randomness helps balance load on update servers.

o Users or administrators can initiate manual scans using tools like the Windows Update
Settings or command-line commands (e.g., wuauclt or USOClient).

 Update Source Query:

o The agent queries configured update sources, such as:

 Microsoft Update: The default public repository for updates.

 WSUS: A centralized update service for enterprises.

 Other Services: Custom or third-party update solutions in specialized


environments.

 Example Use Case:

o In an enterprise setup with WSUS, the WU Agent queries the WSUS server for update
metadata to identify applicable updates for a device’s specific configuration.

 Verification:

o Logs detection results in WindowsUpdate.log or through PowerShell with Get-


WindowsUpdateLog.

2. Download

 Download Mechanism:

o The WU Agent uses the Background Intelligent Transfer Service (BITS) for efficient
downloading:

 Resumes interrupted downloads.

 Schedules downloads during low-traffic periods.


 Minimizes bandwidth usage for other network tasks.

 Update Priority:

o Critical and security updates are prioritized over feature updates and optional updates.

 Example:

o A security patch for a recently discovered vulnerability is automatically downloaded to


mitigate the risk of exploitation.

 Command Example:

o Use the command USOClient StartDownload to manually trigger a download of updates.

3. Installation

 Installation Triggers:

o Updates can be installed based on:

 Automatic Policies: Defined via Group Policy, Intune, or SCCM.

 User Interaction: Manually triggered by the user.

 Maintenance Windows: Scheduled by administrators for minimal disruption.

 Installation Methods:

o Scheduled Installation: Updates are installed at predefined times (e.g., during off-hours).

o Forced Installation: Critical updates override user-defined settings for immediate


installation.

o Manual Installation: Administrators manually install updates via tools or Settings.

 Reboot Management:

o Configurable reboot options ensure smooth operation:

 Policies like NoAutoRebootWithLoggedOnUsers prevent unscheduled restarts.

4. Reporting

 Update Status:

o The WU Agent logs detailed information about:

 Update installations (successes and failures).

 Errors, including error codes and descriptions.


 Metadata such as update IDs and classifications.

 Error Handling:

o Failed updates are automatically retried during the next update cycle.

o Logs provide diagnostic information for troubleshooting.

 Examples of Reporting Tools:

o Logs are accessible via:

 Event Viewer: Applications and Services Logs > Microsoft > Windows >
WindowsUpdateClient > Operational.

 Log Files: C:\Windows\WindowsUpdate.log or parsed using Get-


WindowsUpdateLog.

Windows Update Agent Log Files and Tools

Log Files

1. Key Logs:

o WindowsUpdate.log: Records detection, download, installation, and reporting activities.

o CBS.log: Tracks servicing operations for Windows components.

o Event Viewer logs provide granular insights into update operations.

2. Example Log Entry:

o Detection: Update KB123456 identified as applicable.

o Download: Downloading update KB123456 using BITS.

o Installation: Installing update KB123456.

o Error: Update KB123456 failed with error code 0x8024402c.

Command-Line Tools

1. Legacy Commands:

o wuauclt /detectnow: Forces immediate detection of updates.

o wuauclt /reportnow: Sends an update status report to WSUS.

2. Modern Commands (USOClient):

o USOClient StartScan: Initiates an update scan.


o USOClient StartDownload: Downloads updates.

o USOClient StartInstall: Installs downloaded updates.

Examples of WU Agent Use Cases

1. Small Business Use Case:

o A small business relies on the default Microsoft Update service.

o Automatic updates are enabled, and installation is scheduled daily at 3:00 AM to


minimize disruption.

2. Enterprise Use Case with WSUS:

o An enterprise deploys updates through WSUS.

o The WU Agent on each endpoint queries the WSUS server for approved updates.

o Group Policy ensures updates are installed during predefined maintenance windows.

3. Critical Update Deployment with SCCM:

o A critical zero-day patch is deployed enterprise-wide using SCCM.

o The WU Agent reports compliance and installation status back to SCCM for tracking.

Integrating WU Agent with Configuration Tools

Group Policy Integration:

 Policies control WU Agent behavior, such as:

o Configure Automatic Updates: Automates detection, download, and installation.

o Specify Intranet Microsoft Update Service Location: Directs agents to a WSUS server.

SCCM Integration:

 SCCM enhances the WU Agent’s capabilities by:

o Scheduling update deployments across devices.

o Monitoring compliance with dashboards.

o Deploying custom or third-party updates.

Tanium Integration:

 Tanium provides granular control over endpoint update management:

o Identifies out-of-date systems.


o Executes update installations via distributed queries.

o Offers real-time visibility into patch status.

Blocking a Particular KB Article Using Group Policy (GPO)

Blocking a specific KB article prevents it from being installed on managed systems. This can be achieved
by configuring Windows Update policies via Active Directory Group Policy (domain-wide) or Local Group
Policy Editor (for individual machines).

Using Group Policy via Active Directory

1. Open Group Policy Management Console (GPMC):

o Log in to your domain controller.

o Press Win + R, type gpmc.msc, and press Enter.

2. Create or Edit a GPO:

o Right-click the Group Policy Objects node and select New to create a new GPO (e.g.,
"Block KB123456").

o Alternatively, edit an existing GPO applied to the target devices.

3. Navigate to Windows Update Settings:

o In the GPO editor, navigate to:

mathematica

Copy code

Computer Configuration > Administrative Templates > Windows Components > Windows Update

4. Configure "Do Not Include Drivers with Windows Updates" Policy:

o If applicable to driver updates, configure this policy to ensure drivers associated with KB
updates are not included.

5. Enable "Specify WU Server" (Optional for WSUS):

o If using WSUS, ensure the devices point to your WSUS server under:

sql

Copy code

Computer Configuration > Administrative Templates > Windows Components > Windows Update >
Specify intranet Microsoft update service location.

6. Create a WMI Filter (Optional):


o If blocking specific devices, create a WMI Filter to apply the GPO only to relevant
systems.

o Example WMI Query:

sql

Copy code

Select * From Win32_OperatingSystem Where Caption Like "%Windows 10%"

7. Block the KB Article via Registry Settings:

o Navigate to:

Copy code

Computer Configuration > Preferences > Windows Settings > Registry

o Add a new registry item:

 Action: Create

 Hive: HKEY_LOCAL_MACHINE

 Key Path: SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\


Auto Update\AU

 Value Name: DontOfferKB123456 (replace KB123456 with the KB article number


you want to block)

 Value Type: REG_DWORD

 Value Data: 1

8. Link the GPO:

o Right-click the appropriate OU (Organizational Unit) or domain where the target devices
reside.

o Select Link an Existing GPO and choose the "Block KB123456" GPO.

9. Force GPO Update:

o Run the following command on client machines or the domain:

bash

Copy code

gpupdate /force

Using Local Group Policy Editor (Non-Domain Systems)


1. Open Local Group Policy Editor:

o Press Win + R, type gpedit.msc, and press Enter.

2. Navigate to Windows Update Settings:

o Go to:

mathematica

Copy code

Computer Configuration > Administrative Templates > Windows Components > Windows Update

3. Block Specific Updates via Registry:

o Add a new registry entry in Local Group Policy Editor using the same method as above.

o Registry Key:

mathematica

Copy code

SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\AU

o Create a REG_DWORD with the following properties:

 Name: DontOfferKB123456

 Value: 1

4. Restrict Update Installation via Update IDs (Optional):

o Use tools like Windows PowerShell to list updates and block specific updates:

powershell

Copy code

wusa /uninstall /kb:123456 /quiet /norestart

5. Force Group Policy Update:

o Run the following command in an elevated command prompt:

bash

Copy code

gpupdate /force

Verifying the Policy

1. On the Client Device:


o Run the command to generate a Windows Update log:

powershell

Copy code

Get-WindowsUpdateLog

o Check for entries related to KB123456 and ensure it is not being offered.

2. Registry Validation:

o Verify the registry entry exists:

mathematica

Copy code

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto
Update\AU\DontOfferKB123456

3. Testing with WSUS or Update Services:

o Confirm that the specified KB article is blocked in Windows Update by attempting to


search for updates.

You might also like