Configuring Windows updates in a Network Agent policy

Expand all | Collapse all

To configure Windows Updates in a Network Agent policy:

  1. In the console tree, select Managed devices.
  2. In the workspace, select the Policies tab.
  3. Select a Network Agent policy.
  4. In the context menu of the policy, select Properties.

    The properties window for the Network Agent policy opens.

  5. In the Sections pane, select Software updates and vulnerabilities.
  6. Select the Use Administration Server as WSUS server option to download Windows updates to the Administration Server and then distribute them to client devices through Network Agent.

    If this option is not selected, Windows updates are not downloaded to the Administration Server. In this case, client devices receive Windows updates directly from Microsoft servers.

  7. Select the set of updates that the users can install on their devices manually by using Windows Update.

    On devices running Windows 10, if Windows Update has already found updates for the device, the new option that you select under Allow users to manage installation of Windows Update updates will be applied only after the updates found are installed.

    Select an item in the drop-down list:

    • Allow users to install all applicable Windows Update updates
    • Allow users to install only approved Windows Update updates
    • Do not allow users to install Windows Update updates
  8. Select the Windows Update search mode:
    • Active
    • Passive
    • Disabled
  9. Select the Scan executable files for vulnerabilities when running them option if you want to scan executable files for vulnerabilities while the files are being run.
  10. Make sure that editing is locked for all the settings that you have changed. Otherwise, the changes do not apply.
  11. Click Apply.

See also:

Scenario: Updating third-party software

Page top