Integrate with Windows Update for Business
Applies to: System Center Configuration Manager (Current Branch)
Windows Update for Business (WUfB) allows you to keep Windows 10-based devices in your organization always up-to-date with the latest security defenses and Windows features when these devices connect directly to the Windows Update (WU) service. Configuration Manager can differentiate between Windows 10 computers that use WUfB and WSUS for getting software updates.
- If the Configuration Manager client is still installed on the co-managed device then settings for Cumulative Updates and Feature Updates are managed by Intune. However, third-party patching, if enabled in Client Settings, is still managed by Configuration Manager.
Some Configuration Manager features are no longer available when Configuration Manager clients are configured to receive updates from WU, which includes WUfB or Windows Insiders:
Windows Update compliance reporting:
Configuration Manager will be unaware of the updates that are published to WU. The Configuration Manager clients configured to received updates from WU will display unknown for these updates in the Configuration Manager console.
Troubleshooting overall compliance status is difficult because unknown status was only for the clients that hadn't reported scan status back from WSUS. Now it also includes Configuration Manager clients that receive updates from WU.
Conditional access (for corporate resources) based on update compliance status won't work as expected for clients that receive updates from WU because they would never meet compliance from Configuration Manager.
Definition Updates compliance is part of overall update compliance reporting and won't work as expected either. Definition update compliance is also part of conditional access evaluation
Overall Endpoint Protection reporting for Defender based on update compliance status won't return accurate results because of the missing scan data.
Configuration Manager won't be able to deploy Microsoft updates, such as Office, IE, and Visual Studio to clients that are connected to WUfB to receive updates.
Configuration Manager can still deploy 3rd party updates that are published to WSUS and managed through Configuration Manager to clients that are connected to WUfB to receive updates. If you don't want any 3rd party updates to be installed on clients connecting to WUfB, then disable the client setting named Enable software updates on clients.
Configuration Manager full client deployment that uses the software updates infrastructure won't work for clients that are connected to WUfB to receive updates.
Identify clients that use WUfB for Windows 10 updates
Use the following procedure to identify clients that use WUfB to get Windows 10 updates and upgrades. Then configure these clients to stop using WSUS to get updates, and deploy a client agent setting to disable the software updates workflow for these clients.
Clients that run Windows 10 Desktop Pro or Windows 10 Enterprise Edition version 1511 or later
Windows Update for Business is deployed and clients use WUfB to get Windows 10 updates and upgrades.
To identify clients that use WUfB
Ensure the Windows Update Agent isn't scanning against WSUS, if it was previously enabled. The following registry key can be used to indicate whether the computer is scanning against WSUS or Windows Update. If the registry key doesn't exist, it's not scanning against WSUS.
There's a new attribute, UseWUServer, under the Windows Update node in Configuration Manager Resource Explorer.
Create a collection based on the UseWUServer attribute for all the computers that are connected via WUfB for updates and upgrades. You can create a collection based on a query similar to the one below:
Select sr.* from SMS_R_System as sr join SMS_G_System_WINDOWSUPDATE as su on sr.ResourceID=su.ResourceID where su.UseWUServer is null
Create a client agent setting to disable the software update workflow. Deploy the setting to the collection of computers that are connected directly to WUfB.
The computers that are managed via WUfB will display Unknown in the compliance status and won't be counted as part of the overall compliance percentage.
Configure Windows Update for Business deferral policies
Beginning in Configuration Manager version 1706, you can configure deferral policies for Windows 10 Feature Updates or Quality Updates for Windows 10 devices managed directly by Windows Update for Business. You can manage the deferral policies in the new Windows Update for Business Policies node under Software Library > Windows 10 Servicing.
Beginning in Configuration Manager version 1802, you can set deferral policies for Windows Insider. For more information about the Windows Insider program, see Getting started with Windows Insider program for Business.
- Windows 10 version 1703 or later
- Windows 10 devices managed by Windows Update for Business must have Internet connectivity
To create a Windows Update for Business deferral policy
- In Software Library > Windows 10 Servicing > Windows Update for Business Policies
- On the Home tab, in the Create group, select Create Windows Update for Business Policy to open the Create Windows Update for Business Policy Wizard.
- On the General page, provide a name and description for the policy.
- On the Deferral Policies page, configure whether to defer or pause Feature Updates. Feature Updates are generally new features for Windows. After you configure the Branch readiness level setting, you can then define if, and for how long, you would like to defer receiving Feature Updates following their availability from Microsoft.
- Branch readiness level: Set the branch for which the device will receive Windows updates (Current Branch or Current Branch for Business).
- Deferral period (days): Specify the number of days for which Feature Updates will be deferred. You can defer receiving these Feature Updates for up to 365 days from their release.
- Pause Features Updates starting: Select whether to pause devices from receiving Feature Updates for up to 60 days from the time you pause the updates. After the maximum days have passed, pause functionality will automatically expire and the device will scan Windows Updates for applicable updates. Following this scan, you can pause the updates again. You can unpause Feature Updates by clearing the checkbox.
- Choose whether to defer or pause Quality Updates. Quality Updates are generally fixes and improvements to existing Windows functionality and are typically published the first Tuesday of every month, though can be released at any time by Microsoft. You can define if, and for how long, you would like to defer receiving Quality Updates following their availability.
- Deferral period (days): Specify the number of days for which Quality Updates will be deferred. You can defer receiving these Quality Updates for up to 30 days from their release.
- Pause Quality Updates starting: Select whether to pause devices from receiving Quality Updates for up to 35 days from the time you pause the updates. After the maximum days have passed, pause functionality will automatically expire and the device will scan Windows Updates for applicable updates. Following this scan, you can pause the updates again. You can unpause Quality Updates by clearing the checkbox.
- Select Install updates from other Microsoft Products to enable the group policy setting that make deferral settings applicable to Microsoft Update, as well as Windows Updates.
- Select Include drivers with Windows Update to automatically update drivers from Windows Updates. If you clear this setting, driver updates aren't downloaded from Windows Updates.
- Complete the wizard to create the new deferral policy.
To deploy a Windows Update for Business deferral policy
- In Software Library > Windows 10 Servicing > Windows Update for Business Policies
- On the Home tab, in the Deployment group, select Deploy Windows Update for Business Policy.
- Configure the following settings:
- Configuration policy to deploy: Select the Windows Update for Business policy that you would like to deploy.
- Collection: Click Browse to select the collection where you want to deploy the policy.
- Remediate noncompliant rules when supported: Select to automatically remediate any rules that are noncompliant for Windows Management Instrumentation (WMI), the registry, scripts, and all settings for mobile devices that are enrolled by Configuration Manager.
- Allow remediation outside the maintenance window: If a maintenance window has been configured for the collection to which you're deploying the policy, enable this option to let compliance settings remediate the value outside of the maintenance window. For more information about maintenance windows, see How to use maintenance windows.
- Generate an alert: Configures an alert that's generated if the configuration baseline compliance is less than a specified percentage by a specified date and time. You can also specify whether you want an alert to be sent to System Center Operations Manager.
- Random delay (hours): Specifies a delay window to avoid excessive processing on the Network Device Enrollment Service. The default value is 64 hours.
- Schedule: Specify the compliance evaluation schedule by which the deployed profile is evaluated on client computers. The schedule can be either a simple or a custom schedule. The profile is evaluated by client computers when the user logs on.
- Complete the wizard to deploy the profile.