Patch Management Process
Patch Management Process
The Windows Update Agent (WU Agent) is a fundamental component of the Windows operating system
that manages the update lifecycle. Its core responsibilities include detecting, downloading, installing,
and reporting updates. It interacts with update services such as Windows Server Update Services
(WSUS) or Microsoft Update to ensure devices remain secure, compliant, and up-to-date.
1. Detection
Automatic Scanning:
o Users or administrators can initiate manual scans using tools like the Windows Update
Settings or command-line commands (e.g., wuauclt or USOClient).
o In an enterprise setup with WSUS, the WU Agent queries the WSUS server for update
metadata to identify applicable updates for a device’s specific configuration.
Verification:
2. Download
Download Mechanism:
o The WU Agent uses the Background Intelligent Transfer Service (BITS) for efficient
downloading:
Update Priority:
o Critical and security updates are prioritized over feature updates and optional updates.
Example:
Command Example:
3. Installation
Installation Triggers:
Installation Methods:
o Scheduled Installation: Updates are installed at predefined times (e.g., during off-hours).
Reboot Management:
4. Reporting
Update Status:
Error Handling:
o Failed updates are automatically retried during the next update cycle.
Event Viewer: Applications and Services Logs > Microsoft > Windows >
WindowsUpdateClient > Operational.
Log Files
1. Key Logs:
Command-Line Tools
1. Legacy Commands:
o The WU Agent on each endpoint queries the WSUS server for approved updates.
o Group Policy ensures updates are installed during predefined maintenance windows.
o The WU Agent reports compliance and installation status back to SCCM for tracking.
o Specify Intranet Microsoft Update Service Location: Directs agents to a WSUS server.
SCCM Integration:
Tanium Integration:
Blocking a specific KB article prevents it from being installed on managed systems. This can be achieved
by configuring Windows Update policies via Active Directory Group Policy (domain-wide) or Local Group
Policy Editor (for individual machines).
o Right-click the Group Policy Objects node and select New to create a new GPO (e.g.,
"Block KB123456").
mathematica
Copy code
Computer Configuration > Administrative Templates > Windows Components > Windows Update
o If applicable to driver updates, configure this policy to ensure drivers associated with KB
updates are not included.
o If using WSUS, ensure the devices point to your WSUS server under:
sql
Copy code
Computer Configuration > Administrative Templates > Windows Components > Windows Update >
Specify intranet Microsoft update service location.
sql
Copy code
o Navigate to:
Copy code
Action: Create
Hive: HKEY_LOCAL_MACHINE
Value Data: 1
o Right-click the appropriate OU (Organizational Unit) or domain where the target devices
reside.
o Select Link an Existing GPO and choose the "Block KB123456" GPO.
bash
Copy code
gpupdate /force
o Go to:
mathematica
Copy code
Computer Configuration > Administrative Templates > Windows Components > Windows Update
o Add a new registry entry in Local Group Policy Editor using the same method as above.
o Registry Key:
mathematica
Copy code
SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\AU
Name: DontOfferKB123456
Value: 1
o Use tools like Windows PowerShell to list updates and block specific updates:
powershell
Copy code
bash
Copy code
gpupdate /force
powershell
Copy code
Get-WindowsUpdateLog
o Check for entries related to KB123456 and ensure it is not being offered.
2. Registry Validation:
mathematica
Copy code
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto
Update\AU\DontOfferKB123456