WSUS 3.0 SP2 - Operations Guide
WSUS 3.0 SP2 - Operations Guide
0 SP2
Operations Guide
Microsoft Corporation
Author: Anita Taylor
Editor: Theresa Haynie
Abstract
This guide describes how to manage Windows Server Update Services 3.0 SP2 (WSUS 3.0
SP2). You will find best practices and instructions for managing updates, maintaining client
computers and groups, and running reports. This guide also offers server and client
troubleshooting information.
Copyright Notice
Information in this document, including URL and other Internet Web site references, is subject to
change without notice. Unless otherwise noted, the companies, organizations, products, domain
names, e-mail addresses, logos, people, places, and events depicted in examples herein are
fictitious. No association with any real company, organization, product, domain name, e-mail
address, logo, person, place, or event is intended or should be inferred. Complying with all
applicable copyright laws is the responsibility of the user. Without limiting the rights under
copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying,
recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
© 2009 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, ActiveX, Authenticode, Excel, InfoPath, Internet Explorer, MSDN,
Outlook, Visual Studio, Win32, Windows, Windows Server, and Windows Vista are trademarks of
the Microsoft group of companies.
All other trademarks are property of their respective owners.
Contents
Windows Server Update Services 3.0 SP2 Operations Guide .................................................... 11
In this guide ........................................................................................................................... 11
Setting Up Synchronizations...................................................................................................... 13
Synchronizing Updates by Product and Classification ............................................................. 13
Synchronizing Updates by Language ..................................................................................... 14
Configuring Proxy Server Settings .......................................................................................... 14
Configuring the Update Source .............................................................................................. 15
Configuring Update Storage ................................................................................................... 16
Synchronizing Manually or Automatically ................................................................................ 16
Best Practices with Windows Server Update Services 3.0 SP2 .................................................. 46
Best practices for security ...................................................................................................... 46
Best practices for resource usage .......................................................................................... 47
Disk space ................................................................................................................... 47
Network bandwidth ....................................................................................................... 48
Best practices for setting up WSUS networks ......................................................................... 49
Best practices for maintaining WSUS databases .................................................................... 49
Other best practices ............................................................................................................... 49
Manage restarts ........................................................................................................... 49
Ensure WSUS availability ............................................................................................. 50
Test service packs carefully .......................................................................................... 50
Check overall system health ......................................................................................... 50
Additional Resources for Windows Server Update Services 3.0 SP2 ....................................... 104
Windows Server Update Services communities .................................................................... 104
Additional references ........................................................................................................... 104
Appendix B: Uninstalling WSUS 3.0 SP2 from SQL Server ...................................................... 106
Uninstalling WSUS might leave some WSUS accounts on computers running SQL Server ... 106
Appendix E: Configuring BITS 2.0 and 3.0 for Download Performance..................................... 124
Throttling.............................................................................................................................. 124
Peer caching ........................................................................................................................ 125
In this guide
Administering Windows Server Update Services 3.0 SP2
Troubleshooting Windows Server Update Services 3.0 SP2
Additional Resources for Windows Server Update Services 3.0 SP2
Appendix A: Uninstalling Windows Internal Database
Appendix B: Uninstalling WSUS 3.0 SP2 from SQL Server
Appendix C: IIS Settings for Web Services
Appendix D: Permissions on WSUS Directories and Registry Keys
Appendix E: Configuring BITS 2.0 and 3.0 for Download Performance
Appendix F: Configuring IIS for Download Performance
Appendix G: Windows Update Agent Result Codes
Appendix H: The wuauclt Utility
Appendix I: Database Maintenance
Appendix J: Setup Return Codes
11
Overview of Windows Server Update
Services 3.0 SP2
You can use Windows Server Update Services (WSUS) 3.0 SP2 to manage downloading
software updates from Microsoft Update and distributing them to computers in your network.
Software Updates
Software updates consist of two parts:
Update files: the actual files that are installed on client computers.
Update metadata: the information needed to perform the installation, which includes:
Update properties: title, description, Knowledge Base article, Microsoft Security
Response Center number.
Applicability rules: used by Automatic Updates to determine whether or not the update is
needed on a particular computer.
Installation information: command-line options to apply when installing the updates.
The two parts of the update can be downloaded independently of each other. For example, if you
choose not to store updates locally, only update metadata (and any applicable Microsoft Software
License Terms) will be downloaded to the WSUS server; clients will get their update files directly
from Microsoft Update. On the other hand, if you are storing updates locally on the WSUS server,
you can either download everything at the time of synchronization, or download only the
metadata during the synchronization, leaving the actual update files to be downloaded after you
have approved the update.
12
Managing Windows Server Update Services
3.0 SP2
In this section
Setting Up Synchronizations
Managing the Client Computers and Computer Groups
Managing the Updates
Running WSUS 3.0 SP2 in Replica Mode
Backing Up Windows Server Update Services 3.0 SP2
Managing WSUS 3.0 SP2 from the Command Line
Setting Up Synchronizations
During synchronization, your WSUS server downloads updates (update metadata and files) from
an update source. It also downloads new product classifications and categories, if any. When
your WSUS server synchronizes for the first time, it will download all of the updates you specified
when you configured synchronization options. After the first synchronization, your WSUS server
downloads only updates from the update source, as well as revisions in metadata for existing
updates and expirations to updates.
Note
The first time a WSUS server downloads updates may take a long time. If you are setting
up multiple WSUS servers, you can speed up the process to a certain extent by
downloading all the updates on one WSUS server and then copying the updates to the
content directories of the other WSUS servers. Update metadata must be downloaded
separately to each server during synchronization.
The Options page is the central access point in the WSUS Administration Console for
customizing how your WSUS server synchronizes updates. You can specify which updates are
synchronized automatically, where your server gets updates, connection settings, and the
synchronization schedule. You can also use the Configuration Wizard from the Options page to
configure or reconfigure your WSUS server at any time.
13
synchronizations your WSUS server downloads only the newest updates (or changes to the
updates already available on your WSUS server) for the categories you specified.
You specify update products and classifications on the Options page under Products and
Classifications. Products are listed in a hierarchy, grouped by product family. If you select
Windows, you automatically select every product that falls under that product hierarchy. By
selecting the parent check box you select all items under it, as well as all future versions.
Selecting the child check boxes will not select the parent check boxes. The default setting for
products is all Windows products, and the default setting for classifications is critical and security
updates.
If your WSUS server is running in replica mode, you will not be able to perform this task. For
more information about replica mode, see Running WSUS 3.0 SP2 in Replica Mode.
Note
You can remove products or classifications in the same way. Your WSUS server will stop
synchronizing new updates for the products you have cleared. However, updates that
were synchronized for those products before you cleared them will remain on your WSUS
server and will be listed as available. For more information about removing unused
updates, see Issues with Update Storage.
14
To specify a proxy server for synchronization
1. In the WSUS Administration Console, click Options, and then click Update Source and
Proxy Server.
2. On the Proxy Server tab, select the Use a proxy server when synchronizing check
box, and then type the server name and port number (port 80 is the default) of the proxy
server.
If you want to connect to the proxy server with specific user credentials, select the
Use user credentials to connect to the proxy server check box, and then enter
the user name, domain, and password of the user in the corresponding boxes.
If you want to enable basic authentication for the user connecting to the proxy server,
select the Allow basic authentication (password is sent in cleartext) check box.
3. Click OK.
Note
Because WSUS initiates all of its network traffic, there is no need to configure Windows
Firewall on a WSUS server connected directly to Microsoft update.
15
If you want to synchronize from another WSUS server in your network, click
Synchronize from an upstream Windows Server Update Services server, and
then type the server name and port number in the corresponding boxes.
If you want to use SSL when synchronizing, type the port number that the upstream
server uses for SSL connections, and then select the Use SSL when synchronizing
update information check box. For more information about using SSL during
synchronization, see Securing Windows Server Update Services 3.0 SP2.
If your WSUS server is running in replica mode, type the server name and port
number in the Server name box. The upstream server does not have to be the
administration server (for example, it can be another replica mode server). For more
information about replica mode, see Running WSUS 3.0 SP2 in Replica Mode.
3. Click OK.
1. In the WSUS Administration Console, click Options, and then click Synchronization
Schedule.
2. Click Synchronize manually, and then click OK.
16
2. In the Overview pane, under Synchronization Status, click Synchronize now.
Important
You must first configure client computers to contact the WSUS server before you can
manage them from that server. Until you perform this task, your WSUS server will not
recognize your client computers and they will not be displayed in the list on the
Computers page. For more information about setting up client computers, see the
WSUS Deployment Guide (http://go.microsoft.com/fwlink/?LinkID=139832).
17
can set up a group for that team, decide which updates their computers need and what time they
should be installed, and then use WSUS reports to evaluate the updates for the team.
Computers are always assigned to the All Computers group, and remain assigned to the
Unassigned Computers group until you assign them to another group. Computers can belong to
more than one group.
Computer groups can be set up in hierarchies (for example, the Payroll group and the Accounts
Payable group below the Accounting group). Updates that are approved for a higher group will
automatically be deployed to lower groups, as well as to the higher group itself. Thus, if you
approve Update1 for the Accounting group, the update will be deployed to all the computers in
the Accounting group, all the computers in the Payroll group, and all the computers in the
Accounts Payable group.
Because computers can be assigned to multiple groups, it is possible for a single update to be
approved more than once for the same computer. However, the update will be deployed only
once, and any conflicts will be resolved by the WSUS server. To continue with the example
above, if ComputerA is assigned to both the Payroll and the Accounts Payable groups, and
Update1 is approved for both groups, it will be deployed only once.
You can assign computers to computer groups by using one of two methods, server-side
targeting or client-side targeting. With server-side targeting, you manually move one or more
client computers to one computer group at a time. With client-side targeting, you use Group
Policy or edit the registry settings on client computers to enable those computers to automatically
add themselves into the previously created computer groups. This process can be scripted and
deployed to many computers at once. You must specify the targeting method you will use on the
WSUS server by selecting one of the two options on the Computers section of the Options
page.
Note
If a WSUS server is running in replica mode, computer groups cannot be created on that
server. All the computer groups needed for clients of the replica server must be created
on the WSUS server that is the root of the WSUS server hierarchy. For more information
about replica mode, see Running WSUS 3.0 SP2 in Replica Mode.
For more information about server-side and client-side targeting, see the WSUS Deployment
Guide (http://go.microsoft.com/fwlink/?LinkId=139832).
18
Testing the Updates
Storing the Updates
Overview of Updates
Updates are used for updating or providing a full file replacement for software that is installed on
a computer. Every update that is available on Microsoft Update is made up of two components:
Metadata: Provides information about the update. For example, metadata supplies
information for the properties of an update, thus enabling you to find out for what the update
is useful. Metadata also includes Microsoft Software License Terms. The metadata package
downloaded for an update is typically much smaller than the actual update file package.
Update files: The actual files required to install an update on a computer.
19
2. Set synchronization options, such as update source, product and update classification,
language, connection settings, storage location, and synchronization schedule.
3. Get the updates and associated metadata on your WSUS server through synchronization
from either Microsoft Update or an upstream WSUS server.
4. Approve or decline updates. You have the option of allowing users to install the updates
themselves (if they are local administrators on their client computers).
5. Configure automatic approvals. You can also configure whether you want to enable
automatic approval of revisions to existing updates or approve revisions manually. If you
choose to approve revisions manually, then your WSUS server will continue using the older
version until you manually approve the new revision.
6. Check the status of updates. You can view update status, print a status report, or configure e-
mail for regular status reports.
Update Classifications
Update classifications represent the type of update. For any given product or product family,
updates could be available among multiple update classifications (for example, Windows XP
family Critical Updates and Security Updates). The following table lists update classifications.
20
Update Classification Description
21
Search for updates. You can search for an individual update or set of updates by title,
description, Knowledge Base article, or the Microsoft Security Response Center number for
the update.
View details, status, and revision history for each update.
Approve updates.
Decline updates.
To view updates
1. In the WSUS administration console, expand the Updates node, and then click All
Updates.
2. By default, updates are displayed with their title, classification, installed/not applicable
percentage, and approval status. If you wish to display more or different update
properties, right-click the column heading bar and select the appropriate columns.
3. To sort by different criteria, such as download status, title, classification, release date, or
approval status, click the appropriate column heading.
1. In the WSUS administration console, expand the Updates node, and then click All
Updates.
2. In the center pane next to Approval, select the desired approval status, and next to
Status select the desired installation status. Click Refresh.
1. In the WSUS administration console, expand the Updates node, and then click All
Updates.
2. In the Actions pane, click New Update View.
3. In the Add Update View window, under Step 1: Select properties, select the properties
you need to filter the update view:
Select Updates are in a specific classification to filter on updates belonging to one
or more update classifications.
Select Updates are for a specific product to filter on updates for one or more
products or product families.
Select Updates are approved for a specific group to filter on updates approved for
one or more computer groups.
Select Updates were synchronized within a specific time period to filter on
updates synchronized at a specific time.
Select Updates are WSUS updates to filter on WSUS updates.
4. Under Step 2: Edit the properties, click the underlined words to pick the values you
want.
22
5. Under Step 3: Specify a name, give your new view a name.
6. Click OK.
7. Your new view will appear in the tree view pane under Updates. It will be displayed, like
the standard views, in the center pane when you select it.
1. In the WSUS administration console, expand the Updates node, and then click All
Updates.
2. In the list of updates, click the update you want to view.
3. In the lower pane, you will see the different property sections:
The title bar displays the title of the update; for example, Security Update for
Windows Media Player 9 (KB911565).
The Status section displays the installation status of the update (the computers on
which it needs to be installed, computers on which it was installed with errors,
computers on which it has been installed or is not applicable, and computers that
have not reported status for the update), as well as general information (KB and
MSRC numbers release date, etc.).
The Description section displays a brief description of the update.
The Additional Details section displays the following information:
a. The installation behavior of the update (whether or not it is removable, requests a
restart, requires user input, or must be installed exclusively)
b. Whether or not the update has Microsoft Software License Terms
c. The products to which the update applies
d. The updates that supersede this update
e. The updates that are superseded by this update
f. The languages supported by the update
g. The update ID
Note
You can perform this procedure on only one update at a time. If you select multiple
updates, the first update in the list will be displayed in the Properties pane.
23
WSUS 3.0 SP2 and the Catalog Site
The catalog site is the Microsoft location from which you can import hotfixes and hardware
drivers.
Note
Any computer that has the WSUS administrative console installed, whether or not it is a
WSUS server, can be used to import hotfixes from the catalog site. You must be logged
on to the computer as an administrator to import the hotfixes.
24
Under Authentication and access control, click Edit.
In the Authentication Methods screen, clear the Enable anonymous access
checkbox and select the Integrated Windows authentication check box.
2. Create a WSUS target group for the computers that need the hotfix, and add them to the
group. For more information about computers and groups, see Managing the Client
Computers and Computer Groups.
3. Download the files for the hotfix.
4. Set the permissions of these files so that only machine accounts of those machines can
read them. You will also need to allow the Network Service account full access to the files
5. Approve the hotfix for the WSUS target group created in Step 2.
Approving Updates
You can approve the installation of updates for all the computers in your WSUS network or for
different computer groups. After approving an update, you can do one (or more) of the following:
Apply this approval to child groups, if any.
25
Set a deadline for automatic installation. When you select this option, you set specific times
and dates to install updates, overriding any settings on the client computers. In addition, you
can specify a past date for the deadline if you want to approve an update immediately (to be
installed the next time client computers contact the WSUS server).
Remove an installed update if that update supports removal.
Important
You cannot set a deadline for automatic installation for an update if user input is required
(for example, specifying a setting relevant to the update). To determine whether an
update will require user input, look at the May request user input field in the update
properties for an update displayed on the Updates page. Also check for a message in
the Approve Updates box that says, "The selected update requires user input and
does not support an installation deadline."
Important
If there are updates to the WSUS server component, you cannot approve other updates
to client systems until the WSUS update is approved. You will see this warning message
in the Approve Updates dialog box: "There are WSUS updates that have not been
approved. You should approve the WSUS updates before approving this update." In this
case, you should click the WSUS Updates node and make sure that all of the updates in
that view have been approved before returning to the general updates.
To approve updates
1. In the WSUS administrative console, click Updates.
2. In the list of updates, select the update that you want to approve and right-click (or go to
the Actions pane).
3. In the Approve Updates dialog box, select the computer group for which you want to
approve the update, and click the arrow next to it.
4. Select Approved for Install, and then click Approve.
5. The Approval Progress window will display the progress toward completing the
approval. When the process is complete, the Close button will be available. Click Close.
6. You may select a deadline by right-clicking the update, selecting the appropriate
computer group, clicking the arrow next to it, and then clicking Deadline.
You may select one of the standard deadlines (one week, two weeks, one month), or
you may click Custom to specify a date and time.
If you want an update to be installed as soon as the client computers contact the
server, click Custom, and set a date and time to the current date and time or to one
in the past.
26
2. To select multiple contiguous updates, press SHIFT while clicking updates. To select
multiple noncontiguous updates, press and hold down CTRL while clicking updates.
3. Right-click the selection and click Approve. The Approve Updates dialog box opens
with the Approval status set to Keep existing approvals and the OK button disabled .
4. You can change the approvals for the individual groups, but doing so will not affect child
approvals. Select the group for which you want to change the approval, and click the
arrow to its left. In the shortcut menu, click Approved for Install.
5. The approval for the selected group changes to Install. If there are any child groups, their
approval remains Keep existing approval. To change the approval for the child groups,
click the group and click the arrow to its left. In the shortcut menu, click Apply to
Children
6. To set a specific child to inherit all its approval from the parent, click the child and click
the arrow to its left. In the shortcut menu, click Same as Parent. If you set a child to
inherit approvals, but are not changing the parent approvals, the child will inherit the
existing approvals of the parent.
7. If you want the approval behavior to change for all children, approve All Computers, and
then choose Apply to Children.
8. Click OK after setting all your approvals. The Approval Progress window will display the
progress toward completing the approval. When the process is complete, the Close
button will be available. Click Close.
Note
For more information about downloading and installing updates, see Best Practices with
Windows Server Update Services 3.0 SP2.
Declining Updates
If you select this option, the update is removed from the default list of available updates and the
WSUS server will not offer the update to clients, either for evaluation or installation. You can
reach this option by selecting an update or group of updates and right-clicking or going to the
Actions pane. Declined updates will appear in the updates list only if you select Declined in the
Approval list when specifying the filter for the update list under View.
To decline updates
1. In the WSUS administrative console, click Updates.
2. In the list of updates, select one or more updates that you want to decline.
3. Select Decline.
4. Click Yes on the confirmation message.
27
Change an Approved Update to Not Approved
If an update has been approved and you decide not to install it at this time, and instead want to
save it for a future time, you can change the update to a status of Not Approved. This means that
the update will remain in the default list of available updates and will report client compliance, but
will not be installed on clients.
Note
Not all updates support removal. You can see whether an update supports removal by
selecting an individual update and looking at the Details pane. Under Additional
Details, you will see the Removable category. If the update cannot be removed through
WSUS, in many cases it can be removed with Add or Remove Programs from Control
Panel.
1. In the WSUS administration console, click Options, and then click Automatic
Approvals.
2. In Update Rules, click New Rule.
3. In the Add Rule dialog box, under Step 1: Select properties, select whether to use
When an update is in a specific classification or When an update is in a specific
product (or both) as criteria. Optionally, select whether to Set a deadline for the
approval.
4. In Step 2: Edit the properties click the underlined properties to select the
Classifications, Products, and Computer groups for which you want automatic
approvals, as applicable. Optionally, choose the update approval deadline Day and
Time.
5. In Step 3: Specify a name box, type a unique name for the rule.
6. Click OK.
Note
Automatic approval rules will not apply to updates requiring an End User License
Agreement (EULA) that has not yet been accepted on the server. If you find that applying
an automatic approval rule does not cause all the relevant updates to be approved, you
should approve these updates manually.
29
Automatically Approving Revisions to Updates
and Declining Expired Updates
The Automatic Approvals section of the Options pane contains a default option to automatically
approve revisions to approved updates. You can also set your WSUS server to automatically
decline expired updates. If you choose not to approve the revised version of an update
automatically, your WSUS server will use the older revision, and you must manually approve the
update revision.
Note
A revision is a version of an update that has changed (for example, it might have expired
or have updated applicability rules).
Important
Keeping the default values for these options allows you maintain good performance on
your WSUS network. If you do not want expired updates to be declined automatically,
you should make sure to decline them manually on a periodic basis.
30
In an individual update's detail pane, an informational icon and a message at the top indicates
that it either supersedes or is superseded by another update. In addition, you can determine
which updates supersede or are superseded by the update by looking at the Updates
superseding this update and Updates superseded by this update entries in the Additional
Details section of the Properties. An update's detail pane is displayed below the list of updates.
WSUS does not automatically decline superseded updates, and it is recommended that you do
not assume that superseded updates should be declined in favor of the new, superseding update.
Before declining a superseded update, make sure that it is no longer needed by any of your client
computers. The following are examples of scenarios in which you might need to install a
superseded update:
If a superseding update supports only newer versions of an operating system, and some of
your client computers run earlier versions of the operating system.
If a superseding update has more restricted applicability than the update it supersedes, which
would make it inappropriate for some client computers.
If an update no longer supersedes a previously released update because of new changes. It
is possible that through changes at each release, an update no longer supersedes an update
it previously superseded in an earlier version. In this scenario, you will still see a message
about the superseded update, even though the update that supersedes it has been replaced
by an update that does not.
1. Check the status of the update on client computers. Note which computers show status
as Not applicable for the update, and then compare the properties of those computers
with the properties of the update.
2. Use the information available in the update properties to help you determine which
previously released versions are available. You can look under Updates superseded by
this update in the update's properties, and check the Description and KB article
number entries if appropriate.
3. Look at the properties of the superseded versions of the updates.
4. When you find a superseded update that seems appropriate for the remaining client
computers, approve the update for installation.
31
Office Update Approval
If you use WSUS to update Microsoft Office on your network computers, consider the following:
You must use an original baseline source for Microsoft Office Administrative Install Points
(AIP) to use WSUS to update Office XP and Office 2003 on client computers. If you are
applying updates to the AIP, you cannot use WSUS. The two methods of applying updates
are mutually exclusive. If you have applied an update to an AIP and want to roll back the AIP
to an original baseline source, use the instructions found at the Microsoft Support Web site
(http://go.microsoft.com/fwlink/?LinkId=63962).
Important
Administrative Install Points are relevant only to Office XP and Office 2003. They are not
used with Office 2007.
If you have purchased a "per user" license agreement for Office or have installed Office per
user, WSUS will not update Office.
Users can access the public Microsoft Office Online Web site to look for updates to their
Office installation through the Microsoft Office Update wizard. Using Group Policy, you might
want to create policies that prevent users from getting their own Office updates from
Microsoft Office Online.
For more information and troubleshooting advice, see the following Knowledge Base articles.
Office 2003 updates are offered to a user even if that user has installed those updates when
you use WSUS to deploy software updates and hotfixes to computers that are in your
organization (http://go.microsoft.com/fwlink/?LinkId=78874)
No appropriate Microsoft Office updates are displayed when you use Microsoft Update or
Windows Server Update Services (http://go.microsoft.com/fwlink/?LinkId=78871)
How to change the source for a client computer from an updated administrative installation
point to an Office 2003 original baseline source or Service Pack 2
(http://go.microsoft.com/fwlink/?LinkId=78872)
32
Updating Microsoft SQL Server and Microsoft
Exchange Servers that are part of a cluster
Both Microsoft SQL Server and Microsoft Exchange Server can be installed in a clustered
environment. If there is an update available for clustered servers, each server in the cluster must
be updated individually. Microsoft recommends that you update passive cluster nodes
individually. You will need to stop the cluster service for each server while you update it, and then
restart the service.
Note
You can have both a stand-alone instance and a clustered instance of SQL Server on the
same server. If you are updating a server that is running both a stand-alone instance and
a clustered instance of SQL server, both SQL Server instances will be updated if you
have specified the correct synchronization options.
33
You can create multiple test computer groups with different configurations that resemble the
computers in different departments in your organization.
34
To specify where to store downloaded update files
1. In the WSUS administrative console, click Options, and then click Update Files and
Languages.
2. Click the Update Files tab.
3. Select whether to store update files locally or on Microsoft Update. If you decide to store
update files on your server, you can also choose to download update files only when they
are approved, or to download express installation files.
4. If you decide to store the files on the WSUS server, click the Update Languages tab,
and then select whether to limit the updates downloaded to your WSUS server by
language. You should limit the languages you download if you are going to store update
files on your WSUS server.
5. Click OK.
Note
If your WSUS server is running in replica mode, you will not be able to perform this task.
For more information about replica mode, see Running WSUS 3.0 SP2 in Replica Mode.
35
To change the location of local WSUS update storage
Note
If you do not want to use WSUSutil.exe to change the location of local WSUS update
storage, you can also use NTFS functionality to add a partition to the current location of
local WSUS update storage. For more information about NTFS, see NTFS technical
documentation (http://go.microsoft.com/fwlink/?LinkId=79488).
36
Additional resources
Migrating from Windows Internal Database to SQL Server
Scenarios
The topic presents the following scenarios:
Migrating the Windows Internal Database database to an instance of SQL Server 2008 or
SQL Server 2005 SP2 that is running on the WSUS server
Migrating the Windows Internal Database database to an instance of SQL Server 2008 or
SQL Server 2005 SP2 that is running on another server (remote SQL)
Warning
The procedures in this document use Registry Editor. Serious problems might occur if
you modify the registry incorrectly by using Registry Editor or by using another method.
These problems might require you to reinstall the operating system. Microsoft cannot
guarantee that these problems can be resolved. Modify the registry at your own risk.
Before you edit the registry, export the keys in the registry that you plan to edit, or back
up the whole registry. If a problem occurs, you can then restore the registry to its
previous state.
37
Migrating the WSUS Database
Use the following steps to migrate the WSUS database from a Windows Internal Database
instance to an instance of SQL Server 2008 or SQL Server 2005 SP2.
use master
go
sp_detach_db SUSDB
go
6. In SQL Server Management Studio, under the instance node, right-click Databases,
select Properties, and then click Attach.
7. In this step, you will verify that NT AUTHORITY\NETWORK SERVICE has login
permissions to the instance of SQL Server and to the WSUS database. If it does not, you
will have to add it to both locations. This account should also be a member of the
webService role on the WSUS database.
To verify permissions on the instance of SQL Server, in SQL Server Management
Studio, open the instance and select Security, and then Logins. The NT
AUTHORITY\NETWORK SERVICE account should be listed as a login. If it is not, it
should be added.
To verify permissions on the database, right-click the database, select Properties
and then click Permissions. The NT AUTHORITY\NETWORK SERVICE account
should be listed as a login. If it is not, it should be added.
To verify members of the webService role, under the WSUS database, select Roles,
right-click webService, and then select Properties. The NT AUTHORITY\NETWORK
SERVICE account should be listed as a member of this role. If it is not, it should be
added.
8. In the Attach Databases box, under Databases to attach, locate the susdb.mdf file (by
default, this is C:\WSUS\UpdateServicesDbFiles if you installed Windows Internal
38
Database), and then click OK.
9. In this step, you will edit the registry to both point WSUS to the instance of SQL server
that now holds the WSUS database and recognize the new database for future WSUS
updates. If you have not already done this, export the keys in the registry that you plan to
edit, or back up the whole registry.
a. Click Start, click Run, type regedit, and then click OK.
b. Find the following key:
HKLM\SOFTWARE\Microsoft\UpdateServices\Server\Setup\SqlServerName, and
in the Value box, type [ServerName]\[InstanceName], and then click OK. If the
instance name is the default instance, type [ServerName].
c. Find the following key: HKLM\Software\Microsoft\Update
Services\Server\Setup\wYukonInstalled. In the Value box, type 0, and then click
OK.
10. Click Start, point to Programs, point to Administrative Tools, and then click Services.
11. Right-click IIS Admin Service, and then click Start.
12. Right-click Update Services, and then click Start.
13. Verify that the database migration was successful by opening the WSUS administrative
console. (Click Start, click Administrative Tools, and then click Microsoft Windows
Server Update Services 3.0.)
Note
You might have to restart the server for these settings to take effect.
39
Prerequisites
Front end server starting configuration:
Windows Server 2003 Service Pack 1 or Windows Server 2008 operating system
WSUS with Windows Internal Database
Back end server starting configuration:
Windows Server 2003 Service Pack 1 or Windows Server 2008 operating system
SQL Server 2008 or SQL Server 2005 SP2
To migrate the WSUS database from a Windows Internal Database instance to an instance
of SQL Server 2008 or SQL Server 2005 SP2 on a remote server
1. On the front end server: Install Microsoft SQL Server 2008 or SQL Server 2005 SP2 with the
Server and Client Tools option. This step will enable you to use the SQL Server Enterprise
Manager on the front end server.
2. On the front end server:
a. Click Start, point to Programs, point to Administrative Tools, and then click Services.
b. Right-click IIS Admin Service, and then click Stop.
c. Right-click Update Services, and then click Stop.
3. On the front end server: Run the following SQL command to detach the WSUS database by
using the sqlcmd utility. For more information about the sqlcmd utility, see sqlcmd Utility
(http://go.microsoft.com/fwlink/?LinkId=81183).
sqlcmd -S np:\\.\pipe\MSSQL$MICROSOFT##SSEE\sql\query
use master
go
sp_detach_db ‘SUSDB’
go
4. On the front end server: copy the SUSDB.mdf and SUSDB_log.ldf files from the front end
server to the back end server.
5. On the back end server:
a. To attach SUSDB to the destination instance of SQL server, under the instance node,
right-click Databases, select Properties, and then click Attach.
b. In the Attach Databases box, under Databases to attach, locate the susdb.mdf file (by
default this is C:\WSUS\UpdateServicesDbFiles if you installed Windows Internal
Database), and then click OK.
6. On the back end server:
To verify permissions on the instance of SQL Server, in SQL Server Management Studio,
open the instance ,select Security, and then Logins. The front end server machine
account should be listed as a login. If it is not, it should be added.
40
To verify permissions on the database, right-click the database, select Properties, and
then click Permissions. The front end server machine account should be listed as a
login. If the server account is not listed, it should be added.
To verify members of the webService role, under the WSUS database, select Roles,
right-click webService, and then select Properties. The front end server machine
account should be listed as a member of this role. If the server account is not listed, it
should be added.
7. On the front end server: In this step, you will edit the registry to point WSUS to the destination
instance of SQL and to recognize the new database for future WSUS updates. If you have
not already done so, export the keys in the registry that you plan to edit, or back up the whole
registry.
a. Click Start, click Run, type regedit, and then click OK.
b. Find the following key:
HKLM\SOFTWARE\Microsoft\UpdateServices\Server\Setup\SqlServerName. In the
Value data box, type [BEName]\[InstanceName], and then click OK. If the instance
name is the default instance, type [BEName].
Note
When typing [BEName], do not add the domain name before the name.
c. Find the following key: HKLM\Software\Microsoft\Update
Services\Server\Setup\wYukonInstalled. In the Value box, type 0, and then click OK.
This indicates that Windows Internal Database is not used.
d. Find the following key:
HKLM\SOFTWARE\Microsoft\UpdateServices\Server\Setup\SqlInstanceIsRemote.
In the Value box, change the value to 1, and then click OK.
8. On the front end server:
a. Click Start, point to Programs, point to Administrative Tools, and then click Services.
b. Right-click IIS Admin Service, and then click Start.
c. Right-click Update Services, and then click Start.
9. On the front end server: Verify that the database migration was successful by opening the
WSUS administrative console. (Click Start, click Administrative Tools, and then click
Microsoft Windows Server Update Services 3.0).
Note
You might have to restart the front end server in order for these settings to take
effect.
For more information about the databases that you can use with WSUS, see the following:
In this guide, see Managing the Databases.
In Deploying Microsoft Windows Server Update Services, see "Choose the Database
Used for WSUS 3.0."
41
In Deploying Microsoft Windows Server Update Services, see "Appendix B: Configure
Remote SQL" for general information about how to set up WSUS by using a remote SQL
server to host the WSUS database.
Important
If you choose to remove unneeded content with the Server Cleanup Wizard, all the
private update files that you have downloaded from the Catalog Site will be removed as
well. You will need to re-import these files after running the Server Cleanup Wizard.
43
If a replica server tries and fails to synchronize with the upstream server, it will retry the
synchronization twice at approximately fifteen-minute intervals. If both retries fail, the replica
server will run synchronization at the next scheduled time.
44
6. Under Items to back up, select the WSUS folder (typically %systemdrive%\WSUS\), and
then click Next.
7. Click the Browse button to choose a place to save your backup, type a name for the
backup, and then click Next.
8. If you want to set additional specifications for your backup, including whether it will be an
incremental backup, whether you want to verify the backup, set a recurring schedule for
the backup, or other options, click Advanced, and then follow the instructions in the
wizard.
9. When the wizard is finished, click Finish.
10. When the message appears that informs you that the backup is complete, click Close.
Important
You should restore the backup file to only one WSUS server. The backed-up information
includes the Server ID, so if you restore the same backup file to two or more WSUS
servers there will be two or more WSUS servers with the same ID. If you attempt to roll
up information from downstream servers with duplicate IDs to an upstream server, you
will get information from only one of these downstream servers.
After restoring the WSUS database you must recycle the WSUS Application Pool in IIS, as
described in the next procedure. This will ensure that the restored database will sync up correctly
with IIS, through which you manage the WSUS Web site and Web services. For more information
about application pools, see IIS Help.
45
(IIS) Manager.
2. In the tree view, expand the tree under the WSUS server name, and then expand
Application Pools.
3. Right-click WSUSPool, and then click Recycle.
4. Close IIS Manager.
If you store updates locally on the WSUS server, after restoring the WSUS database reset it with
the wsusutil.exe command-line utility, which ensures that every row of update metadata in the
database is matched by the corresponding update files in the local storage location. If the utility
does not find matching data, it will download the update files from Microsoft Update. For more
information about the WSUS command-line utility, see Managing WSUS 3.0 SP2 from the
Command Line.
46
3. Make sure that the WSUS server that downloads updates from Microsoft Update is secured
behind a firewall, and allows access only to the domains needed by WSUS. For a description
of these domains, see the WSUS Deployment Guide
(http://go.microsoft.com/fwlink/?LinkId=139832).
4. Make sure that WSUS servers have only the file and folder permissions that are needed by
WSUS. For a description of the necessary file and folder permissions, see the WSUS
Deployment Guide (http://go.microsoft.com/fwlink/?LinkId=139832).
5. If a WSUS server is Internet-facing, its database should be located on a different computer
that is not reachable from the Internet. For remote SQL Server installation information, see
the WSUS Deployment Guide (http://go.microsoft.com/fwlink/?LinkId=139832).
6. There are two security groups that are set up for WSUS: WSUS Administrators and WSUS
Reporters. WSUS Administrators can perform any WSUS task, while WSUS Reporters have
read-only access (view server settings, get reports, and so on). Make sure that the only
people in the WSUS Administrators group are the ones who need to perform administrative
tasks.
Network bandwidth
The following practices will help you improve the way WSUS uses network bandwidth.
1. When deploying large updates (such as service packs), you can avoid saturating the network
by doing the following:
a. Use BITS throttling. BITS bandwidth limitations can be controlled by time of day, but
apply to all applications using BITS. For more information about BITS throttling, see
Appendix E: Configuring BITS 2.0 and 3.0 for Download Performance.
b. Use IIS throttling, which limits throttling to one or more Web services. For more
information about IIS throttling, see Appendix F: Configuring IIS for Download
Performance.
c. Use targeting to control the rollout. You can set up multiple computer groups, then
approve large service pack downloads for a subset of these groups at one time.
2. Use peer caching (available only on Windows Vista and Windows Server 2008 operating
systems) to minimize downloads from WSUS servers to clients and maximize the "sharing" of
downloads among peer computers on a subnet of the network. This will reduce network load
and in particular load on the WSUS server. For more information about peer caching, see
Appendix E: Configuring BITS 2.0 and 3.0 for Download Performance.
3. Consider configuring WSUS clients to synchronize more frequently from the WSUS server
and configuring downstream WSUS servers to synchronize more frequently from their
48
upstream servers. This will allow updates to be deployed to clients faster, which could be
important if you need to deploy an ―emergency update‖ that must be installed as quickly as
possible. This will result in smaller downloads from server to client, but will add additional
load to the WSUS server. It will also add additional load to the network when updates are
deployed, because clients start downloading updates as soon as they synchronize with the
server.
49
automatic downloads but manual installations at a time when the servers can be restarted if
necessary.
3. Configure e-mail notification to tell you when updates become available, so you can plan the
deployment of these updates in advance.
4. If you need to deploy an ―emergency update‖ and can’t wait for the next scheduled
installation, approve the update with a deadline in the past. This will cause the update to be
installed the next time the clients synchronize from the server. If you can’t wait for the next
synchronization, create a script to automate installing the updates and then restarting your
server. For more information about creating scripts to automate Automatic Updates tasks,
see the Windows Update Agent Software Developer's Kit
(http://go.microsoft.com/fwlink/?LinkID=43101).
5. Configure client computers or WSUS servers to immediately install updates that do not
require a restart. For information about setting up client computers for a scheduled
installation, see the WSUS Deployment Guide
(http://go.microsoft.com/fwlink/?LinkId=139832).
50
1. You should check the WSUS administration console home page at least once a day to view
overall update compliance and network health.
2. Check application logs frequently, if you suspect problems such as download failures or
clients that are failing to report to the WSUS server.
3. Install the WSUS MOM Pack to monitor overall service health.
Note
You can also use Windows® PowerShell® to access the WSUS 3.0 APIs from the
command line.
Tip
To see all wsusutil parameters, type wsusutil help on the command line. To see usage
for each of the parameters, type wsusutil help parameterName.
Command Description
settings.
configuressl
Updates the WSUS server registry key after the IIS configuration has changed. If this command is
run with the optional parameter ServerCertificateName, it updates the certificate name. If it is run
without the optional parameter, it updates the setting for host headers, if there are any. For more
52
information about configuring SSL for WSUS, see the Securing WSUS with the Secure
Sockets Layer Protocol section in the Windows Server Update Services 3.0 SP2 Deployment
Guide.
Syntax
The following command updates the host headers, if any:
wsusutil configuressl
The following command updates the server certificateName:
wsusutil configuressl ServerCertificateName//sets the server certificate name
Parameter Description
Output
The output from the wsusutil configuressl command is the address of the WSUS Web site
(including the port number), for example https://serverName:443.
healthmonitoring
This command sets and gets the different parameters for WSUS health monitoring.
Syntax
Wsusutil healthmonitoring parameterName
Note
You may set or get only one parameter at a time.
Parameter Description
53
Parameter Description
space (in megabytes) at which a
low disk space warning or error
event should be logged.
54
Parameter Description
55
Parameter Description
Output
The output from wsusutil paramName is usually the current state of the given parameter. Some
examples are given below:
wsusutil healthmonitoring IntervalsInMinutes
Output:
Detect interval: 10 min, Refresh interval: 360 min
wsusutil healthmonitoring DiskSpaceInMegabytes
Output:
Error level: 200 MB, Warning level: 500 MB
However, with the parameters setting on or off the different health monitoring checks (for
example, wsusutil healthmonitoring CheckAcls), the output will simply be a warning that the
WSUS Service must be stopped and restarted for the change to take effect.
export
For more information about exporting and importing updates, see the Set Up a Disconnected
Network (Import and Export the Updates) section in the Windows Server Update Services 3.0
SP2 Deployment Guide.
Syntax
wsusutil export package logfile
Parameter Description
logfile The path and file name of the log file to create.
56
Note
Exporting from a WSUS 2.0 server to a WSUS 3.0, WSUS 3.0 SP1, or WSUS 3.0 SP2
server (or from a WSUS 3.0, WSUS 3.0 SP1, or WSUS 3.0 SP2 server to a WSUS 2.0
server) is not supported.
Import
For background and procedural information about exporting and importing updates, see the
WSUS Deployment Guide at WSUS Deployment Guide
(http://go.microsoft.com/fwlink/?LinkId=139832).
Syntax
wsusutil import package logfile
Parameter Description
logfile The path and file name of the log file to import.
Note
Importing from a WSUS 2.0 server to a WSUS 3.0, WSUS 3.0 SP1, or WSUS 3.0 SP2
server (or from a WSUS 3.0, WSUS 3.0 SP1, or WSUS 3.0 SP2 server to a WSUS 2.0
server) is not supported.
Movecontent
When you run this command, wsusutil does the following:
Copies the update files from the old location to the new location. The old location is not
deleted.
Updates the WSUS database to refer to the new location of the update files.
Ensures that the content and metadata are synchronized. This check is always run, even if
the –skipcopy parameter is used.
The destination folder to which update files are moved must be on an NTFS partition. The utility
will not try to copy update files if they already exist in the destination folder. The destination folder
will have the same permissions that were set on the original folder.
Note
You can use xcopy, the Backup utility, or other methods to copy update files from the old
location to the new one. If you copy the files by using a method other than wsusutil, you
still need to run wsusutil to perform the second part of the move, using the -skipcopy
parameter. See the "Syntax" section for more information.
57
There are two scenarios in which you might move update files from one WSUS drive to another:
If the drive is full
If the hard disk fails
Syntax
wsusutil movecontent contentpath logfile -skipcopy
Parameter Description
contentpath The new root for content files. The path must
exist.
logfile The path and file name of the log file to create.
listfrontendservers
This command lists the different front-end servers in a network load balancing configuration. It
can be useful in troubleshooting a NLB (network load balancing) configuration and after setting up
a new front-end server to make sure that it is configured properly.
58
deletefrontendserver
This command deletes the given front-end server.
Syntax
wsusutil deletefrontendserver serverName
Parameter Description
Important
This command removes the front-end server from the database only. You will need to run
wsussetup /u on the front-end server to uninstall WSUS.
checkhealth
This command checks the health of the WSUS server. The health check is configured by
wsusutil healthmonitoring). The results are written to the event logs.
Syntax
wsusutil checkhealth
reset
You use this command if you store updates locally on your WSUS server and want to ensure that
the metadata information stored in your WSUS database is accurate. With this command, you
verify that every update metadata row in the WSUS database corresponds to update files stored
in the local update file storage location on your WSUS server. If update files are missing or have
been corrupted, WSUS downloads the update files again. This command might be useful to run
after you restore your database, or as a first step when troubleshooting update approvals.
Syntax
wsusutil reset
listinactiveapprovals
If you change language options on an upstream WSUS server, the number of approved updates
on the upstream server may not match the number of approved updates on a replica server. For
example, consider the following scenario. You configure your upstream server to synchronize all
languages, then synchronize and approve 300 updates, of which 50 are non-English language
updates. Afterward, you change the language setting on the server to English only. Later, a
replica server synchronizes from the upstream server and downloads the "active" approvals,
59
which now are only the English language ones (replica servers synchronize only active
approvals). At this point, you will see 300 updates approved on the upstream server, but only 250
approved on the replica server. You can use listinactiveapprovals to see a list of the updates on
the parent upstream server that are permanently inactive—in this case, the 50 updates that are
not English. You do not have to run this command before running the removeinactiveapprovals
command.
Syntax
wsusutil listinactiveapprovals
removeinactiveapprovals
See the explanation above for a description of situations in which you might need to use
removeinactiveapprovals. You do not have to run the listinactiveapprovals command before
running this command.
Syntax
wsusutil removeinactiveapprovals
usecustomwebsite
If you set this value to true, WSUS Setup will use port 8530 for its Default Web site. If you set it to
false, WSUS will use port 80.
Important
You must use this command before you configure SSL.
Important
If you are installing SharePoint on the same machine as WSUS, the value of
usecustomwebsite should be set to true before the install.
Important
Using this command after running WSUS Setup will fail if the index of the default Web
site is set to a value other than 1.
Syntax
wsusutil usecustomwebsite true
60
Reports in Windows Server Update Services
3.0 SP2
Reports are an important part of managing WSUS. You can keep track of nearly every aspect of
the WSUS network by means of reports. The following types of reports are provided:
Summary compliance reports (the number of computers that need to install updates and the
number of updates missing from computers).You can generate these reports from the root
node of the WSUS administration console.
Individual computer reports. You can generate these reports by right-clicking the computer in
the Details pane.
Individual update reports. You can generate these reports by right-clicking the update in the
Details pane.
Downstream server summary compliance reports. You can generate these reports by right-
clicking the server in the Details pane.
Synchronization reports. You can generate these reports by right-clicking the synchronization
in the Details pane.
In this section
Terminology for Update Status
Creating Reports
Status Description
61
Status Description
When referring to status for a computer group,
the Needed column displays the number of
computers in the group to which the update is
applicable. A positive Needed result means that
the update was determined to be applicable,
but has not been installed the last time client
computers contacted the WSUS server,. Any of
the following could be true when the status for
an update is Needed:
You have approved the update for
installation, but the client computers have
not yet contacted the WSUS server since
you made this change.
The update has already been downloaded
and installed, but the client computer has
not contacted the WSUS server since the
update was installed.
The update has already been downloaded
and installed, but the client computer must
be restarted before changes go into effect,
and the client computer has not yet been
restarted.
The update has been downloaded to the
computer but not installed.
The update has been neither downloaded
nor installed on the computer.
No status This usually means that since the time that the
update was synchronized to the WSUS server,
the computer has not contacted the WSUS
server.
62
Status Description
installation was attempted on the computer for
the update.
Creating Reports
Reports enable you to monitor different aspects of the WSUS network: updates, client computers,
and downstream servers. If a WSUS server has replica servers, you can choose to roll up the
replica servers' client status to the upstream server. For information about creating a replica
server and status rollup, see the WSUS Deployment Guide
(http://go.microsoft.com/fwlink/?LinkId=139832).
You can generate different kinds of update reports from different places in the WSUS
administration console.
1. General reports on the Reports page.
2. Reports on specific updates: right-click the update (or go to the Actions pane) and choose
Status Report.
3. Reports on specific computers: right-click the computer (or go to the Actions pane) and
choose Status Report.
Note
Generating detailed reports for large numbers of computers and/or updates can be very
memory-intensive. Detailed reports are most effective for smaller subsets of your
computers or updates. If you need to create a very large report and are concerned about
using CPU and memory resources on the WSUS server, you may generate the report
from a remote WSUS Administration console.
63
Update Reports
Update reports show you the status of your updates. You can run update reports in four ways:
summary, detailed, tabular, and tabular for approved updates. You can also filter an update report
by update classification, product, target computer group, and update installation status.
The report displays information from the most recent contact between client computers and the
WSUS server. The frequency with which client computers contact the WSUS server is configured
through Group Policy. By default, this is every 22 hours. Unless you want to change the contact
frequency for your client computers, generate this report the day after you approve updates, so
that it reflects your latest approvals.
Note
You can run wuauclt /detectnow from the command prompt on computers that are
running WSUS client software (Automatic Updates) in order to start contact between the
client computer and WSUS server. This is used primarily to update status for a particular
computer. There will be a few minutes delay between running the command and seeing
the results on the WSUS server. After forcing the client to contact the server, you can get
its status with an update status report. For more information about wuauclt, see Appendix
H: The wuauclt Utility.
Updates Report tree view The tree listing all the updates in the report.
64
Column name Description
Approval Summary for Computer Group The listing of groups and approvals.
Computer Reports
Computer reports show you the status of computers. You can run computer reports in four ways:
summary, detailed, tabular, and tabular for approved updates. You can also filter a computer
report by update classification, product, target computer group, and update installation status.
Report Options Shows the start and end dates of the period
shown in the report, as well as the date of the
report and the server for which the report was
made.
66
Component name Purpose
clicking the update. An update status report will
be generated for that individual report.
Printing a Report
You can print the report in update summary, detailed, or tabular views, depending on how you
have formatted the update status report.
To print a report
Exporting a Report
You can print a report in its original format, or you can export it to Microsoft Excel or PDF formats.
Important
Exporting a large report can be extremely time-consuming and may exceed your
computer's memory resources. If you are planning to export a report, consider limiting the
size of the report to 200 pages or fewer. You can use different filters to reduce the size of
the report, or you can choose the tabular format rather than the detailed format to reduce
the number of pages to export.
Extending Reports
You can customize WSUS reports in different ways:
1. Use the WSUS APIs to create a custom report
2. Use WSUS public views to create and extend custom reports
67
Use WSUS APIs to Create Custom Reports
For more information on WSUS APIs, see the Windows Server Update Services SDK
documentation on MSDN (http://go.microsoft.com/fwlink/?LinkId=85713). You can use these APIs
to create reports on updates, approvals, installation information, and the like.
68
Health Monitoring in WSUS 3.0 SP2
WSUS monitors the health of the WSUS server and its components by means of a service that
runs at frequent intervals and logs the results as events in the event log. You can look at the
events with the Event Viewer, and you can get more information by downloading the WSUS 3.0
MOM Pack.
Health checks
The WSUS health monitoring service automatically checks the health of WSUS components as
long as WSUS server components are installed on the computer. (The service does not run on
computers where only the console or only the database is installed.) The health check service
has two cycles: detect and refresh. In the detect cycle, only changes are logged (for example, a
service was running but has stopped). In the refresh cycle, all errors and warnings are logged. By
default the detect cycle polls WSUS components every ten minutes and the refresh cycle polls
every six hours, but if you wish to run the health check at other times (for example, to verify a
configuration change to WSUS or to configure the service to run more or less often), you can use
the wsusutil utility. For instructions on running the utility, see Managing WSUS 3.0 SP2 from the
Command Line under the "healthmonitoring" section.
1. Start the Event Viewer (click Start, click Run, and then type eventvwr).
2. In the left pane, click Application.
3. Find the events whose source is Windows Server Update Services.
WSUS logs error, warning, and informational events. Errors are problems that should be fixed
immediately (for example, that available local storage has dropped below a certain level),
warnings are notifications of situations that are tending to become problems (for example, that
69
WSUSService has stopped, or that synchronization has not taken place in the last 24 hours), and
informational events are notifications of situations that are probably not problems (for example,
that a service has stopped or started).
Resolving problems
In many cases the solution to an error or warning event will be obvious. For example, if disk
space is low, you would remove unneeded files. In other cases, you might need to do more
investigation before deciding on the right solution. You could read the troubleshooting sections of
this document, or search online for similar issues. If you are using the Microsoft Operations
Manager, you can also download the WSUS 3.0 (MOM) Pack.
WSUS 3.0 SP2 Server Administration Issues
WSUS 3.0 SP2 Client Computer Administration Issues
70
Troubleshooting WSUS setup
Check for required software and hardware
WSUS has a number of requirements that need to be met before installation. For more
information, see Deploying Microsoft Windows Server Update Services
(http://go.microsoft.com/fwlink/?linkid=79983).
71
Look at the WSUSSetupMsi_timestamp.log file for the return value of HideConsoleApp.exe. If
the return value is not zero, that means that the custom action running HideConsoleApp.exe
failed.
Look at the WSUSCa_timestamp.log file to see whether the failure is due to the service being
marked for deletion.
Reboot the machine and rerun setup. All the open handles to the service are closed when the
machine shuts down, and this should resolve the problem.
Disable and then reenable the ASP.NET V2.0.50727 Web service extension through the IIS
UI. Make sure that the final status of this Web service extension is ―allowed.‖
UseCustomWebsite fails when the default Web site does not have a site ID
of 1
If the default Web site has been deleted and recreated, the default Web site will get assigned a
Web site ID other than 1 by IIS. Consequently, WSUS Setup at the default Web site will fail.
There are two ways you can work around this issue:
Reinstall IIS in order to ensure the default Web site is created with a Web site index.
WSUS Setup will still work if installed to port 8530. Check if the value of usecustomwebsite
value is set to on.
72
API compression may not be used after installing WSUS 3.0 SP2 on
Windows Server 2008
If you want to use API compression on Windows 2008 ensure that dynamic compression IIS role
service is installed. This feature is not installed in the default IIS installation on Windows Server
2008.
WSUS 3.0 SP2 setup fails to install to Windows Server 2008 when installing
to a case-sensitive SQL and the computer name is in lowercase letters
SQL requires the computer name to be in uppercase letters. Rename the computer using all
uppercase letters.
Certificate Not Configured after WSUS 2.0 SP2 is Upgraded to WSUS 3.0
with Custom Web site
If WSUS 2.0 SP2 was configured to use SSL, you will need to reinstall the certificate after the
upgrade is complete by using the following syntax:
wsusutil configuressl ServerCertificateName
73
Issues with the WSUS 3.0 SP2 Administration
Console
If you get an error when using or trying to access the WSUS console, use the following
information to troubleshoot the problem.
Source: System
Stack Trace:
at System.Net.Sockets.Socket.InternalConnect(EndPoint remoteEP)
You should wait at least 30 seconds before clicking Reset on the error message.
74
Cannot see client computers in the WSUS administration console
If client computers do not appear on the Computers page in the WSUS administration console,
there is probably a problem with client self-update, which is the mechanism that WSUS uses to
update Automatic Update software. For more information about client self-update, see Issues with
Client Self-Update.
Cannot see computers having 100 percent installed state on the Computers
page when the "Installed/NotApplicable or No Status" filter is applied
If there are locally published updates on the server, you may not see accurate status or counts for
your computer because locally published updates interfere with the filtering mechanisms.
Get error accessing WSUS 3.0 servers from the WSUS administration
console because the WWW Publishing service is configured to allow
interaction with the desktop
If you attempt to access the WSUS administration console and fail to connect to the server, you
may have gotten the following error:
The WSUS administration console was unable to connect to the WSUS Server via the remote
API.
Verify that the Update Services service, IIS, and SQL are running on the server. If the
problem persists, try restarting IIS, SQL, and the Update Services Service.
The WSUS administration console has encountered an unexpected error. This may be a
transient error; try restarting the administration console. If this error persists, tr y
removing the persisted preferences for the console by deleting the wsus file under
%appdata%\Microsoft\MMC\.
This error is probably due to the WWW Publishing service being configured to allow interaction
with the desktop. To solve this problem, take the following steps:
1. Open the Services snap-in (click Start, click Run, and then type services.msc).
2. Right-click the World Wide Web Publishing service and select Properties.
3. On the LogOn tab, clear the Allow service to interact with desktop check box.
4. Click OK, and then dismiss the Services snap-in.
5. From a command shell, type iisreset.
75
6. At this point you should be able to access the WSUS server from the console again.
This error is caused by the issue described in KB919085
(http://go.microsoft.com/fwlink/?LinkId=86366).
Get other errors accessing WSUS 3.0 servers from the WSUS
administration console
In many cases, when you have gotten a connection error, it may be helpful to run the iisreset
command.
Note
Performing a reset causes the WSUS server to be unresponsive for up to five minutes.
76
changes may have reset these permissions. One indication of this problem may be event ID
10012 in the Application log file.
The following permissions are necessary:
The root folder of the local content directory must have at least Read permissions for the
Users security group and the NT Authority\Network Service account. In other words, if the
WSUS content directory is C:\Updates\WSUSContent, the Updates directory must have the
correct permissions. The BITS service will fail if these permissions are not set.
The content directory itself (in the above example, the WSUSContent directory) must have
Full Control permissions for the NT Authority\Network Service account.
The temporary ASP.NET directory
(%windir%\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files) must have Full
Control permissions for the NT Authority\Network Service account.
The %TEMP% directory (usually %windir%\TEMP) must have Full Control permissions for
the NT Authority\Network Service account.
1. Click Start, click All Programs, click Accessories, click System Tools, and then click
Disk Cleanup.
2. Select the Windows components, applications, and files that can be removed, and then
click OK.
Note
For more information about using the WSUSUtil utility, see Managing WSUS 3.0 SP2
from the Command Line.
Before you move the SQL Server installation to another drive, you should make sure that the
WSUS administration console is not open. If you have problems with the move, make sure that
the WSUS Web services have been stopped. Occasionally, a move will fail if the clients are
communicating with the server.
Note
Consult your SQL Server documentation to find out how to detach and reattach
databases.
Troubleshooting synchronization
Check the error in the synchronization's Details pane
If a synchronization has failed, in the WSUS administration console, go to the Synchronizations
node, and in the middle pane select the failed synchronization. In the Synchronization Details
pane you will see Details, which links to the full error description.
78
Synchronization retries by downstream servers
If the upstream WSUS server is not available for synchronization from a downstream server at
the scheduled time, the downstream server will try to synchronize twice more, at approximately
15 minute intervals. If neither of the retries succeeds, the downstream server will try again the
next day at the scheduled synchronization time.
79
ping WSUSServerName
where WSUSServerName is the name of the upstream WSUS server with which you are
trying to synchronize.
Verify that users and the network service have Read permissions to the
local update storage directory
If you store update files on your WSUS server, you need to ensure that the folder to which you
download update files (by default C:\WSUS) has at least Read permissions for the network
service and for users. This is true for both upstream and downstream WSUS servers.
On a downstream WSUS server, check that the updates are available on the
upstream WSUS server
There are a number of situations where the updates on the upstream server no longer match the
updates being requested at synchronization by the downstream server. Some of the following are
examples of when this might occur:
An upstream WSUS server is reinstalled and the set of classifications and products the
administrator selects is smaller than the set previously selected for the earlier installation.
The downstream servers might then attempt to synchronize updates that the newly rebuilt
upstream server has not downloaded. Synchronization will fail for updates that do not exist on
the upstream server.
A downstream server is reconfigured to get updates from a different upstream server with
different products and classifications selected.
To troubleshoot this issue, make a note of the updates for which download failed on the
downstream server. These will be visible on the Updates page, and marked with a red "X." Check
if these updates exist on the upstream server (look at the Updates page). If they do not match, do
one of the following, depending on which updates you need:
Specify the missing updates on the upstream server, and then synchronize from the update
source.
If the failed updates are not needed, cancel and then decline the updates that are not on the
upstream server
If the missing updates are actually available on the upstream server, then the error is
transient, meaning the update might have been downloaded to the upstream server after it
was requested by the downstream server. This issue will resolve itself the next time the
downstream server synchronizes to the upstream server.
80
1. On the WSUS server, click Start, point to Administrative Tools, and then click
Services.
2. Right-click Background Intelligent Transfer Service, click Properties, and make sure
that Startup Type is Manual. After that click Start.
3. Right-click Windows Update Service, and then click Restart.
4. Retry synchronization: In the WSUS console, click Options, click Synchronization
Options, and then under Tasks, click Synchronize now.
You should also ensure that both the BITS and the WSUS service are set to start automatically
on reboot.
81
Remote computers accessed by using Terminal Services cannot be
restarted by non-administrators
Non-administrators using terminal services computers will not be able to restart their computers
remotely. Therefore, if a remote computer on which an update is installed needs to be restarted
for the update to take effect, users without administrative permissions will be unable to complete
the updating of their remote computer.
82
Issues with E-Mail Notifications
If you are not receiving e-mail notifications after having set up your WSUS server to send them,
you should check both the WSUS server's e-mail setup and the SMTP configuration on the e-mail
server.
Note
You will need to use the sqlcmd utility. For more information about the sqlcmd utility,
see sqlcmd Utility (http://go.microsoft.com/fwlink/?LinkId=81183).
83
If you are using Windows Internal Database as the WSUS database, use the following
string in place of SqlServerName in the command:
np:\\.\pipe\MSSQL$MICROSOFT##SSEE\sql\query
Troubleshooting services
General service troubleshooting
You can use the following steps to restart services that are not functioning properly:
1. Locate the service (click Start, point to Administrative Tools, click Services, and then look
for the service).
2. Verify that the service is running. Click Start if it is stopped or Restart to refresh the service.
You can also use the Event Viewer to check the Application, Security, and System event logs to
see if there are any events that indicate a problem. You should also check the
SoftwareDistribution.log to see if there are events that indicate a problem.
Reset IIS
You should reset IIS if you suspect that there are problems with Web services.
1. Open a command window.
2. Type iisreset
SQL service
The SQL service must be running for all the services except the self-update service. If any of the
log files indicate SQL connection problems, check the SQL service first. To access the SQL
service, click the Start button, point to Administrative Tools, click Services, and then look for
one of the following:
MSSQLSERVER (if you are using Windows Internal Database, or if you are using SQL
Server and are using the default instance name for the instance name).
MSSQL$WSUS (if you are using a SQL Server database and have named your database
instance "WSUS").
84
Right-click the service, and then click Start if the service is not running or Restart to refresh the
service if it is running.
In This Section
Issues with Client Computer Groups
Issues with Update Installation on Clients
Issues with Clients Not Reporting
Issues with Client Self-Update
Issues with BITS
Issues with High CPU Utilization
85
Client computers appear in the wrong groups
Using Group Policy or registry settings to move computers into target groups is called client-side
targeting. For information about how to set up client-side targeting, see the WSUS Deployment
Guide (http://go.microsoft.com/fwlink/?LinkId=139832). There are a number or reasons why
computers might not appear in groups when you are using client-side targeting. Use the following
information to try to resolve this problem.
Verify that target computer group names match groups on the WSUS
server
Make sure the name of the target computer group matches the name of the computer group on
the WSUS server. Check the Group Policy object (GPO) or the registry setting where you
enabled client-side targeting. Make sure that there are no discrepancies between the name of the
computer group used in Group Policy and the name of the group used on the server. If WSUS
cannot find a computer group on the server reported by a client computer, the computer will
appear in the Unassigned Computers group.
86
Troubleshooting Update Installation Issues
Checking DCOM Configuration
The process of checking DCOM configuration is slightly different on different operating systems.
87
the response stream when you send a POST request
(http://go.microsoft.com/fwlink/?LinkId=80715).
Note
Failure of clients to contact the server is not related to compression. Administrators
should not disable IIS compression, because allowing noncompressed data can increase
network traffic and server load, while reducing the number of clients that can be served
effectively.
Note
If you do not see the File Download window, make sure that the client self-update tree
has been configured properly. For more information, see Issues with Client Self-Update.
88
WUStatusServer REG_SZ http://WSUSServerName
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
You should see output similar to the following if Automatic Update is functioning, but the
client has not been configured to get its updates from a WSUS server:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
If the query returns the error, "The system was unable to find the specified registry key or
value," Automatic Update has not been configured on this computer.
If the output from step 2 above contains values for WUServer and WUStatusServer, try to
contact the WSUS server listed in these values.
3. Open Internet Explorer and in the Address bar type http://WUServer
where WUServer stands for the value in the output from step 2.
You should see an "Under Construction" page if the WUServer value is valid. If it is not,
you will get an HTTP error of some kind.
89
Troubleshooting client self-update issues
If the client self-update does not work automatically, use the following suggestions to troubleshoot
the problem.
SUS Client
90
WSUS Client (Windows XP)
91
WSUS Client (Windows Vista)
92
Check for the self-update tree on the WSUS server
WSUS Setup creates a virtual directory named Selfupdate under the Web site running on port 80
of the computer where you install WSUS. This virtual directory, called the self-update tree, holds
the latest WSUS client. For this reason, you must have a Web site running on port 80, even if you
put the WSUS Web site on a custom port. The Web site on port 80 does not have to be dedicated
to WSUS. WSUS uses the site on port 80 only to host the self-update tree.
To ensure that the self-update tree is working properly, first make sure there is a Web site set up
on port 80 of the WSUS server. After that you should run the WSUS script that ensures a proper
configuration of self-update on port 80. Open a command window on the WSUS server and type
the following:
cscript WSUSInstallDirectory\setup\installselfupdateonport80.vbs
where WSUSInstallDirectory is the directory in which WSUS is installed. If the script is successful,
you should see the following output:
Microsoft (R) Windows Script Host Version 5.6
SetupSelfupdateTree: Finding the index of the Web site on which WUS is installed...
SetupSelfupdateTree: Finding the index of the web site bound to port 80...
SetupSelfupdateTree: szPort80RootPath=c:\inetpub\wwwroot
If you have WSUS client self-update running on port 80 of the WSUS server, see the next
section.
93
If you have installed Windows SharePoint Services on the default Web site
in IIS, configure it to coexist with Self-update
If you install Windows SharePoint Services on the same server that is running WSUS, you might
see the following issues:
An "Access denied" message appears when Automatic Updates tries to update itself, and the
latest Automatic Updates will not be running.
A message appears warning you that the SelfUpdate service is not available.
If client computers are not running the WSUS-compatible version of Automatic Updates, they will
not be able to receive updates through WSUS.
94
2. Expand the local computer node.
3. Expand the WSUS Web site node.
4. Right-click Selfupdate, and then click Properties.
5. On the Directory Security tab, under Authentication and access control, click Edit.
6. In the Authentication Methods dialog box, check the Enable anonymous access
check box, and then clear all the buttons below if checked. The user name and
password box should be pre populated.
7. Click OK twice.
95
1. Click Start, then Run, and type regedit, and then click OK.
2. In Registry Editor, navigate to the WindowsUpdate key by expanding the following:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\
If the WindowsUpdate key does not exist, you need to add it.
3. On the menu, click Edit, point to New, and then click Key.
4. Type WindowsUpdate as the name for the new key.
5. Double-click the WUServer setting, type the URL to your WSUS server, and then press
ENTER.
If the WUServer setting does not exist, you need to add it.
On the menu, click Edit, point to New, and then click String Value.
6. Type WUServer as the setting name.
7. Double-click the WUStatusServer setting, type the URL to your WSUS server, and then
press ENTER.
If the WUStatusServer setting does not exist, do the following:
On the menu, click Edit, point to New, and then click String Value.
8. Type WUStatusServer as the setting name.
9. Navigate to the following:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\A
U
If the AU key does not exist, do the following:
On the menu, click Edit, point to New, and then click Key.
10. Type AU as the name for the new key.
11. Verify that the UseWUServer setting has a value of 1 (0x1). If it does not, modify it by
double-clicking the setting and then changing the value.
If the UseWUServer setting does not exist, do the following:
On the menu, click Edit, point to New, and then click DWORD Value.
12. Type UseWUServer for the setting name.
13. Navigate to the following:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\WindowsUp
date\Auto Update
14. Enable and configure Automatic Updates through Control Panel:
Click Start, click Control Panel, and then double-click Automatic Updates.
15. In the Automatic Updates dialog box, specify download and installation options, and
then click OK. Make sure that Turn off Automatic Updates is not selected.
16. Ensure that the AUState setting has a value of 2 (0x2). If it does not, modify it by double-
clicking and changing the value.
17. If the LastWaitTimeout setting exists, delete it.
96
18. If the DetectionStartTime setting exists, delete it.
19. Close the Registry Editor.
To force the WSUS client computer to check with the WSUS server
1. At the command prompt, stop the Automatic Updates service by typing the following, and
then pressing ENTER:
net stop wuauserv
2. At the command prompt, restart the Automatic Updates service by typing the following,
and then pressing ENTER:
net start wuauserv
3. The self-update should occur in six to ten minutes.
4. Wait approximately one minute, and then refresh the registry. You should now see the
following settings and values:
DetectionStartTime (REG_SZ) YYYY.MM.DD HH.MM.SS. The DetectionStartTime
value is written in local time, but the detection actually occurs 5 minutes after the time
noted.
LastWaitTimeout (REG_SZ) YYYY.MM.DD HH.MM.SS. The LastWaitTimeout
value is written in GMT or Universal Time, and represents the actual time that
detection occurs.
Although these values refer to the time that detection is going to start, the first phase of detection
is the process of checking whether a self-update is necessary. Therefore, these values actually
refer to the time that the self-update from SUS client to the WSUS client should occur.
If the client software has not self-updated after ten minutes, refresh the \Auto Update registry
key. If the LastWaitTimeout value has changed and is now 24 hours later than its previous
value, that indicates that Automatic Updates was not able to contact the server URL that you
specified in the WUServer value.
You should also check the functioning of the Client Web Service. See Issues with WSUS 3.0
Services for more information.
97
BITS provides a downloadable tool called bitsadmin that allows you to verify and change BITS
settings. For more information about the bitsadmin utility, see BITSAdmin Tool
(http://go.microsoft.com/fwlink/?LinkId=80934). This tool is available as part of the Windows Vista
operating system, and also as part of the Windows XP Service Pack 2 Support Tools.
Finding BITS
To find the BITS service, open a Command Prompt and type:
sc query bits
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE,NOT_PAUSABLE,ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
If BITS is not running, you should see output like the following:
SERVICE_NAME: bits
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 1 STOPPED
(NOT_STOPPABLE,NOT_PAUSABLE,IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Note
To modify, stop, or restart BITS, log on as a local administrator.
98
2. Type sc stop bits
3. Type sc start bits
The BITS service must run under the Local System user account
By default BITS runs under the LocalSystem account.
There is a mismatch between the BITS per-user job limit and the per-
computer job limit
To detect or correct a mismatch between the per-user job limit and the per-computer
job limit specified through Group Policy
1. Run gpedit.msc, if the policy is specified locally; if the policy is a domain policy edit the
Group Policy object with GPMC.
2. In the Group Policy Object Editor, navigate to Computer Configuration\Administrative
Templates\Network\Background Intelligent Transfer Service (BITS).
99
3. Ensure that the setting "Maximum number of BITS jobs for each user" is set to a lower
value than the setting "Maximum number of BITS jobs for this computer"
4. Type gpupdate /force
5. Stop and restart BITS.
6. Verify that there are no errors in the event logs.
100
Error name Error code Description
using the context of the
job owner.
101
Error name Error code Description
versions of the Apache
2.0 proxy server are
known to exhibit this
behavior.
ERROR_SERVICE_DISABLED 0x80070 BITS has been disabled. Enable the BITS service.
422
102
ERROR_SERVICE_DEPENDEN 0x80070 A service appearing in the BITS service
CY_DELETED 433, dependency list cannot be started. Make sure the
ERROR_SERVICE_DEPENDEN 0x80070 dependency list for the BITS service is correct:
CY_FAIL 42c Windows Vista: RpcSs, EventSystem (also
http.sys and LanManWorkstation when
peercaching is enabled)
Windows Server 2003: Rpcss, EventSystem
Windows XP: Rpcss
Important
This action should only be taken in circumstances where all other troubleshooting
attempts have failed. You must be an administrator to modify the BITS configuration.
103
Sc failure bits reset= 86400 actions=restart/60000/restart/120000
3. Stop and restart BITS.
An access violation error message appears and the system may appear to become
unresponsive when you try to install an update from Windows Update or from
Microsoft Update
There is an update for this issue described by Microsoft KB Article number 927891
(http://go.microsoft.com/fwlink/?LinkId=85649).
There are a large number of superseded updates approved on the WSUS server
This problem occurs if you do not decline expired definition updates or expired malicious
software (also known as malware) updates on the WSUS server. There is an update for
this issue described by Microsoft KB article number 938947
(http://go.microsoft.com/fwlink/?LinkId=148750).
Additional references
For complete information about installing and using WSUS, see the following:
104
WSUS Step by Step Installation Guide (http://go.microsoft.com/fwlink/?LinkId=139836)
WSUS Deployment Guide (http://go.microsoft.com/fwlink/?LinkId=139832)
WSUS Release Notes (http://go.microsoft.com/fwlink/?LinkId=139840)
WSUS Administration Console online Help
For information that helps you automate tasks or customize WSUS, see the Microsoft
Windows Server Update Services Software Developer's Kit
(http://go.microsoft.com/fwlink/?LinkID=43099) and Windows Update Agent Software
Developer's Kit (http://go.microsoft.com/fwlink/?LinkID=43101). Note that the Windows
Update Agent is the Automatic Updates service. Both SDKs contain information about the
application programming interface (API), as well as sample scripts and ready-to-use tools for
your WSUS deployment and implementation.
Important
Uninstalling Windows Internal Database is not recommended, because it may affect other
applications that may be using the same database instance (such as Windows
SharePoint Services).
Important
The removal of the application may not remove the default .mdb and .ldb files, which will
cause a subsequent WSUS 3.0 installation to fail. These files can be deleted from the
%windir%\SYSMSI\SSEE directory.
105
Appendix B: Uninstalling WSUS 3.0 SP2 from
SQL Server
Read the following information before uninstalling WSUS.
106
IIS vroots
The following virtual directories (vroots) are created in IIS (in the Default Web Site by default) for
client-to-server synchronization, server to server synchronization, reporting, and client self-
update.
107
Vroot in IIS Properties
108
W3SVC/WebSiteID/ROOT/Content
W3SVC/WebSiteID/ROOT/DssAuthWebService
W3SVC/WebSiteID/ROOT/Inventory
W3SVC/WebSiteID/ROOT/ReportingWebService
W3SVC/WebSiteID/ROOT/Selfupdate
W3SVC/WebSiteID/ROOT/ServerSyncWebService
W3SVC/WebSiteID/ROOT/SimpleAuthWebService
Note
If you have installed WSUS on the default Web site, WebSiteID will be 1, but if you have
installed it on another Web site, WebSiteID will be a random number.
Global properties
These global properties can be retrieved with the following adsutil command:
adsutil.vbs enum W3SVC
The properties listed below are a partial list.
Property Value
109
Property Value
DownlevelAdminInstance (INTEGER) 1
AspScriptTimeout (INTEGER) 90
AspSessionTimeout (INTEGER) 20
AspCodepage (INTEGER) 0
110
Property Value
AspProcessorThreadMax (INTEGER) 25
AspQueueConnectionTestTi (INTEGER) 3
me
PasswordChangeFlags (INTEGER) 6
AuthFlags (INTEGER) 1
111
Property Value
AspAppServiceFlags (INTEGER) 0
112
Property Value
AspKeepSessionIDSecure (INTEGER) 0
AspExecuteInMTA (INTEGER) 0
[/w3svc/1] n/a
[/w3svc/AppPools] n/a
[/w3svc/Filters] n/a
113
Property Value
[/w3svc/Info] n/a
Property Value
ServerState (INTEGER) 2
ServerSize (INTEGER) 1
DefaultDoc (STRING)
"Default.htm,Default.asp,index.htm,iisstart.htm"
Win32Error (INTEGER) 0
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/ApiRemoting30"
114
Property Value
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\ApiRemoting30"
AuthFlags (INTEGER) 21
115
Property Value
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/ClientWebService"
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\ClientWebService"
AuthFlags (INTEGER) 1
116
Properties of the Downstream Server
Authentication Web service
Property Value
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/DssAuthWebService"
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\DssAuthWebService"
AuthFlags (INTEGER) 1
117
Property Value
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/Inventory"
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\Inventory"
AuthFlags (INTEGER) 1
118
Property Value
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/ReportingWebService"
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\ReportingWebService"
AuthFlags (INTEGER) 1
119
Property Value
Path (STRING)
"<WSUSInstallDir>\WebServices\ServerSyncWebService"
120
Property Value
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/ServerSyncWebService"
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\ServerSyncWebService"
AuthFlags (INTEGER) 1
121
Properties of the Simple Authorization Web
service
Property Value
AppRoot (STRING)
"/LM/W3SVC/WebSiteID/ROOT/SimpleAuthWebService"
AppIsolated (INTEGER) 2
Path (STRING)
"<WSUSInstallDir>\WebServices\SimpleAuthWebService"
AuthFlags (INTEGER) 1
122
Property Value
123
NT AUTHORITY\SYSTEM:(OI)(CI)F
Throttling
Versions of BITs use the computer's network card to measure network traffic. BITS 3.0 can also
use the Internet gateway device to monitor traffic if the computer is correctly configured; see
Background Intelligent Transfer Service (http://go.microsoft.com/fwlink/?LinkId=79389) for details.
However, in some situations the network card in itself does not give an accurate measurement of
the actual state of network traffic. For example, if a computer has a fast network card but a slow
network connection (such as a dial-up connection), BITS will give an overly optimistic
measurement. It is possible to use Group Policy (in both BITS 2.0 and 3.0) to throttle or limit the
network bandwidth that BITS uses for downloads or uploads.
Note
BITS bandwidth limitations are system wide, not application specific. You cannot use this
setting to limit only WSUS download bandwidth, because the BITS settings will affect
BITS in any application.
124
To set BITS bandwidth limitations
1. Start the Group Policy Object Editor (click Start, click Run, and then type gpedit.msc).
2. Expand Computer Configuration, then Administrative Templates, then Network, then
Background Intelligent Transfer Service.
3. Open the Maximum network bandwidth that BITS uses (BITS 2.0) or Maximum
network bandwidth for BITS background transfers (BITS 3.0) setting.
4. Set the transfer rate in kilobits per second that you want BITS to use (the default is 10).
5. Set the times at which you want to limit the bandwidth (the default is 8:00 A.M. to 5:00
P.M.).
6. Set the limitations to be used outside of the designated time (the default is Use all
available unused bandwidth, but you may select another limitation).
7. Click OK.
Note
You must be an administrator to perform this procedure.
Peer caching
Peer caching is a new feature of BITS 3.0 that allows peers (computers within the same subnet of
a network that have the peer caching feature enabled) to share files. If peer caching is enabled
on a computer, the Automatic Update agent instructs BITS to make downloaded files available to
that computer's peers as well.
When the files have been downloaded, BITS caches them. When another (peer caching-enabled)
computer tries to download the same update, BITS on that computer sends a multicast request to
all of that computer's peers. If one or more of the peers responds to the request, BITS will
download the file from the first computer to respond. If the download from the peer fails or take
too long, BITS continues the download from the WSUS server or Microsoft Update.
This feature of BITS can optimize the bandwidth used by WSUS in several ways.
1. Peer caching decreases the amount of data transferred from the WSUS server to its clients,
because computers in the same subnet will usually download the updates from each other.
2. Peer caching decreases the amount of data transferred across the WAN when some or all of
the clients of a WSUS server are located in different locations.
3. Peer caching decreases the amount of data transferred across the Internet if WSUS clients
in the same subnet are configured to download updates from Microsoft Update.
Note
BITS peer caching requires computers to be running Windows Vista or Windows
Server 2008, and to be part of an Active Directory Domain.
For more information about peer caching and peer servers, see Peer Caching
(http://go.microsoft.com/fwlink/?LinkId=79432).
125
To enable peer caching (on Windows Vista)
1. Start the Group Policy Object Editor (click Start, click Run, and then type gpedit.msc).
2. Expand Computer Configuration, then Administrative Templates, then Network, then
Background Intelligent Transfer Service.
3. Enable the Allow BITS Peercaching setting.
4. Enable the Maximum network bandwidth used for Peercaching setting, and set the
maximum bandwidth in bits per second (the default is 104857), then click OK.
5. Enable the Limit the BITS Peercache size setting, and set the percentage of disk space
to be used for the peer cache (the default is 5 percent), and then click OK.
6. Enable the Limit age of items in the BITs Peercache setting, and set the number of
days (the default is 90), and then click OK.
Note
You must be an administrator to perform this procedure.
1. Open IIS Manager (click Start, click Administrative Tools, and then click Internet
Information (IIS) Manager).
2. Navigate to the Web Sites node under the local computer, right-click the node, and then
click Properties.
3. Select the Performance tab.
4. Under Bandwidth throttling, select Limit the total network bandwidth available for
all Web sites on this server, and then specify the maximum bandwidth in kilobytes per
second (the default is 1024). You cannot specify a bandwidth lower than 1024 kilobytes
per second.
5. Click OK.
126
Note
You must be logged on as an administrator or have run IIS as an administrator to perform
this procedure.
Note
You must be logged on as an administrator or have run IIS as an administrator to perform
this procedure.
127
Result Code Result String Description
updated itself.
128
Result Result String Description
Code
129
Result Result String Description
Code
130
Result Result String Description
Code
131
Result Result String Description
Code
30 invalid.
132
Result Result String Description
Code
133
Result Result String Description
Code
exceeded the time limit.
134
Result Result String Description
Code
135
Result Result String Description
Code
137
Result Result String Description
Code
138
Result Result String Description
Code
139
Result Result String Description
Code
140
Result Result String Description
Code
141
Result Result String Description
Code
package was invalid.
142
Result Result String Description
Code
0A because its update handler could
not be recognized.
143
Result Result String Description
Code
144
Result Result String Description
Code
particular class.
145
Result Result String Description
Code
FFF another WU_E_DRV_* code.
146
Result Result String Description
Code
system configuration is not
supported.
147
Result Result String Description
Code
01 could not be completed because an
expression was unrecognized.
148
Result Result String Description
Code
FF covered by another error code.
Option Description
where <scriptLocation> is the directory where you have copied the WsusDBMaintenance script.
149
Appendix J: Setup Return Codes
Windows Server Update Services 3.0 uses the following return codes to determine the success or
the failure of its Setup.
150
Return Code Return String Meaning
151