Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 : Designing a Windows Update Strategy for the Enterprise - Planning and Implementing Windows Software Update Services (WSUS)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/6/2011 7:02:32 PM
Administrators often have to deploy updates throughout the entire enterprise. This could include updates to the following:
Operating systems

If you're working in a complex environment, this probably includes several different versions of Windows (possibly going back as far as Windows NT), as well as the probable presence of Linux or Unix, including Mac OS X.

Applications

When I say applications, you have to consider standardized Microsoft applications, as well as third-party applications and custom applications. In total, they represent three different stages of updates that have to be conducted, because not all applications are well known enough or complex enough to support automatic updating processes.

Drivers

Factoring drivers into the equation provides a conundrum for many enterprises. More often than not, the rule for drivers is "if it ain't broke, don't fix it." But the problem with that philosophy is that many vendors will say that certain driver updates are critical to the functionality of their hardware. This results in vendors and support contracts recommending or demanding updates and company policies refusing to accommodate them. Ultimately, something has to give, but which one depends on the circumstance and pure chance.

Firmware

Firmware plays a major role in the enterprise. Sometimes, pieces of hardware will experience functionality problems that will have to be fixed by firmware updates. And firmware updates usually involve the certainty of one problem, downtime, and the possibility of another, critical failure. So, these present yet another problem that you have to deal with.

Accordingly, deploying updates (if done manually) can require hundreds, if not thousands, of hours of labor because each update is applied to a computer and subjected to numerous tweaks and updates. To avoid this, Windows administrators can use the Windows Software Update Services (WSUS) technology.

With WSUS, you can automate the process of deploying updates by setting up a server as a dedicated update server (the WSUS server). This server then sends updates to various computers throughout the enterprise automatically, or as determined by the user, which alleviates the need to go install each of these updates one at a time, computer by computer. Additionally, WSUS can roll back updates and install or uninstall drivers based on the administrator's decision. If you use a proper deployment, Windows software updates can become a very relaxed process.

The process can be deployed either remotely or locally —this is the administrator's decision. In either case, Windows requires the answers to two questions to deploy an update:

  • Where is this update located?

  • Where should this update be placed?

The first question is asked by the update server so it knows where the data it should distribute is located. Knowing this, it can make sure the right type of update is applied to computers, which factors into the second question, "Where should this update be placed?" WSUS has two separate group roles that aid in the process of answering this question:

WSUS Administrators

This is a local group on the WSUS server that is responsible for preparing update policies and administering the WSUS console.

WSUS Reporters

This is another local group that can run reports on updates to determine their impact on the environment.

1. WSUS Server Deployment

Usually whenever a WSUS deployment is created, as few servers as possible are used. There are several reasons for this, but this is mainly because WSUS is incredibly powerful and capable of supporting tens of thousands of computers at the same time, making just one server capable of supporting all but the largest of large networks. Therefore, it's not practical to have numerous update servers spread throughout the network.

This can change, however, depending on the complexity of the network. Specifically, the physical number of servers can change depending upon how many subnetworks or different sites are present throughout the enterprise. The more subnetworks, the more transitions at the packet level have to be completed through routers in order to deploy these updates. Consequently, best practices strongly recommend having a WSUS server run on your local area network. And, since it's impractical and ultimately practically impossible to have that many users on one local area network, more WSUS servers have to be implemented.

2. Anatomy of WSUS

The current version of WSUS as of the printing of this book is Windows Software Updates Services version 3.0 Service Pack 1. It is not available by default with Windows Server 2008, but it can be downloaded freely at Microsoft.com in either X86 or X64 version, based on the configuration of your Windows Server 2008 machine. Each version can deploy updates to any version of Windows on your network once it has been set up.

Regardless of the version, WSUS uses two different streams, called the upstream and the downstream.

2.1. Upstream

An upstream in WSUS is any server that functions as a central authority that is responsible for the constant broadcast and upload of Windows Update. Generally, the upstream used as the original point of authority is the actual Windows Update web server maintained by Microsoft. However, in certain deployments, WSUS servers can be configured as Windows Update upstream configuration computers in order to more thoroughly control the reception of updates throughout your enterprise.

2.2. Downstream

The next layer of server down from an upstream server is (as the name slightly implies) a downstream server. Downstream servers are servers along the WSUS path. They receive their updates from an upstream server and are then responsible for cycling and distributing the updates to the rest of the environment. Using downstream servers, WSUS adds an extra layer of complexity as these servers forward the information they are given. However, WSUS also adds a level of security if configured properly. Here's how the path works in a downstream server–based environment:

  1. The originating server sends a request for an update.

  2. An upstream server sends the updates.

  3. A downstream server sends the update to the destination machine.

  4. The destination machine applies the update.

3. WSUS Update Hierarchy and Administration Decisions

I have covered two WSUS components and types of servers so far: upstream servers and downstream servers. With these types of servers, you have to keep in mind a couple of considerations. The first is to identify the upstream server, in other words, the point of origin. Is it Microsoft Update? Or is it your own custom server? The answer determines how the rest of your infrastructure will be laid out. As I've said before, usually this is Microsoft Update.

The next portion is the harder part of this decision: the downstream server. Downstream servers can be deployed in two modes: replica mode and autonomous mode.

3.1. Replica Mode

With replica mode, downstream servers take the information they receive from an upstream server and replicate it through the rest of the environment. This means they receive updates and then send those updates through the entire enterprise. One of the upsides of this configuration mode is that it's simple to configure. One of the downsides is that it is very bandwidth intensive and requires a lot of dedicated time that may not be available at the moment that updates are required.

3.2. Autonomous Mode

Using autonomous mode, downstream servers function as individual entities that can be configured by lower-level update administrators. Using powers granted to them by local administrators, lower-level administrators can choose which updates are and are not applied to their network. This is highly advantageous because sometimes parts of a network are running critical pieces of software that cannot risk the volatility of an update or are running a component that is not compatible with the rest of the network.

In Exercise 1, you'll learn how to install and set up WSUS.

Exercise 1: Installing and Setting Up WSUS

Note that before installing WSUS, you must have IIS 7 installed and that you must have Microsoft Report Viewer installed. You can obtain each of these files through www.microsoft.com.

  1. Download the WSUS install file from Microsoft at http://technet.microsoft.com/en-us/wsus/default.aspx. The file is named WSUSSetup_30SP1_x86.exe (or WSUSSetup_30SP1_x64.exe for the 64-bit version).

  2. Double-click the install file.

  3. Choose Full Server Installation because a console installation will not allow for the GUI you need in this exercise. Click Next.

  4. Agree to the terms of service, and then click Next.

  5. On the Windows Server Update Services 3.0 SP1 Setup Wizard's Select Update Source screen, make sure the Store Updates Locally option is selected and that C:\WSUS is the default folder, as shown here. This makes sure that all updates are stored in this location when they are downloaded. Click Next.



  6. On the next screen, Database Options, leave the default settings as shown here, and then click Next. Alternatively, you could use an existing database for this, but you will create a new one within the WSUS folder in this exercise. Click Next.



  7. On the Web Site Selection screen, choose the Create a Windows Server Update Services 3.1 SP1 Web Site option. This creates a custom web site for you to be able to view Windows updates. Click Next.



  8. Click Next on the Summary screen. Afterward, WSUS will begin to install; this may take a while.

  9. Click Finish.

  10. Once complete, this will launch the Windows Server Update Services Configuration Wizard shown here. Upon the first step, it will ask you a couple of configuration questions about your network. Make sure these concerns are alleviated, and click Next when complete.



  11. Click Next upon the improvement program, unless you do not want your data shared. In that case, unselect the box, and click Next.

  12. On the Choose Upstream Server screen, you can choose where this server receives updates from. Since this is the only WSUS server in this exercise, choose Synchronize from Microsoft Update. Alternatively, if you have a more complex environment, you could specify the WSUS server to receive data from another WSUS server and then specify the server name and port number of that server. For now, click Next.

  13. Click Next on the Specify Proxy Server screen because you do not require a proxy server.

  14. On the Connect to Upstream Server screen, the Windows Server Update Services Configuration Wizard will tell you that it needs to connect to Microsoft Update to collect information. You will need to click the Start Connecting button, as shown here. This will take a few moments as the server connects to Microsoft Update. Afterward, click Next.



  15. You can then choose any specific languages you would like to receive and even configure your updates to choose all languages available. For this exercise, choose English, and then click Next.

  16. The next screen, Choose Products, is where you want to pay some careful attention. Here, you can choose any Microsoft product you want to update. As you can see, you have many choices. For this simple example, leave the default Microsoft Office and Windows selected. In a real environment, you may need to choose many more selections. For now, click Next.



  17. Next, you can choose the classification of updates. This includes special tools, updates, drivers, critical updates, and so forth. You can choose which you would like to receive, but the default selection is quite intuitive. This is because it contains the most critical information necessary to keep your environment running. Make your selection, and then click Next.

  18. On the next screen, choose Synchronize Automatically, and leave it at the default time. This makes the WSUS server check Microsoft Update once per day to see whether there are any new updates. Click Next.



  19. Click Next on the Finished screen, and then click Finish again. This launches the WSUS home screen and will signify that you have completed your installation.




Now that you have WSUS installed, in Exercise 2 you'll learn how to set up WSUS.

Exercise 2: Setting Up WSUS

To complete this exercise, you must have completed Exercise 1.

  1. Open WSUS by selecting Administrative Tools => Microsoft Windows Server Update Services 3.0 SP1. You may see a message informing you that the snap-in is being installed.

  2. Based upon the number of products and classification of updates you selected, selecting your WSUS server will produce a list of several updates, as shown here.



  3. Now, before you can get started using Windows Software Updates Services, you have to begin by creating a GPO for your domain that lets you use WSUS. This is because WSUS is administrated through Group Policy.

  4. Open the GPMC by selecting Administrative Tools => Group Policy Management.

  5. Expand your domain, and then select the Group Policy Objects container.

  6. Right-click in the GPO area on the right side of the screen, and select New. In the dialog box, name the policy WSUS Policy.

  7. Once the policy is created, open the Group Policy Management Editor by right-clicking the WSUS policy and selecting Edit.

  8. Expand the Policies section of the Computer Configuration area, right-click Administrative Templates, and select Add/Remove Templates.



  9. Select Add.

  10. In the Filename box, type wuau, and then click Open. This opens the default administrative template that is used for administering WSUS.

  11. Close the dialog box.

  12. Under the Computer Configuration, select Administrative Templates => Windows Components => Windows Update.

  13. On the right side, double-click Configure Automatic Updates.

  14. Select the radio button Enabled, and then change the first drop-down list to 3-Auto Download and Notify for Install. Leave the other options default.

  15. Click the Next Setting button.

  16. Select the radio button Enabled, and then set the two boxes to http://<yourservername>. Click the Next Setting button.



  17. Select the Enabled button again, and then change the syncing period to a period of your choosing; 22 to 24 hours is appropriate.

  18. Click OK.

  19. Close the editor, right-click your domain in the GPMC, and select Link an Existing GPO.

  20. Select WSUS Policy, and then click OK.

  21. Now, return to the Windows Update Service home screen. If you click Computers on the left, at least the main computer and most likely several other computers will show up when you click the Search button in the upper-right corner. If they do not, you can issue the following command on your domain controller in the console:

    gpupdate /force

    Also, on any client computers connected to your domain controller, you can tell them to automatically look for a new update server by issuing the wuauclt.exe /detectnow command.

At this point, Group Policy should now be set up on WSUS, and you should be able to view computers on your WSUS home screen. If not (or if you experience trouble along the way), you can reference the Microsoft "Step-by-Step Guide" to WSUS, located on Microsoft.com.


4. WSUS Grouping

When the WSUS Management User Services screen is launched, by default it loads a home screen that includes several notifications and a single group on the left. This group is referred to as the Unassigned Computers group. When rolling out updates, WSUS supports the ability to group computers based on the need to update individual platforms.

As you saw earlier, WSUS supports all Microsoft business products. Thus, certain groups may require different deployments of updates, based on the type of products installed. This type of deployment is called client-side deployment and is used as an alternative to Group Policy–specific deployment for individual groups.

To create a new user group using WSUS grouping, you can start WSUS, select the Computers area after expanding the server name, expand the All Computers area, and click Add Computer Group on the right, as shown in Figure 3.

Figure 3. Adding a computer group
Other -----------------
- Windows Server 2008 : Designing a Windows Update Strategy for the Enterprise - System and Environment Health Models
- Windows Server 2003 : Troubleshooting TCP/IP Routing
- Windows Server 2003 : Securing Remote Access
- Windows Server 2003 : Static and Dynamic Routing
- Microsoft Exchange Server 2003 Security : Protecting Against Computer Viruses
- Microsoft Exchange Server 2003 Security : Managing Connectivity Across Firewalls
- Windows Server 2008 : Designing an Effective Administration Model - Object Essentials
- Windows Server 2008 : Application Virtualization
- SharePoint 2010 Disaster Recovery for End Users : SharePoint Workspace 2010
- SharePoint 2010 Disaster Recovery for End Users : WebDAV and Explorer View
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server