Skip to content

Update waas-wu-settings.md #12008

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: public
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 7 additions & 1 deletion windows/deployment/update/waas-wu-settings.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,8 @@ If the setting is set to **Disabled** or **Not Configured**, and if Automatic Up
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.
The option to download files with missing URLs allows content to be downloaded from the Alternate Download Server when there are no download URLs for files in the update metadata. This option should only be used when the intranet update service doesn't provide download URLs in the update metadata for files that are present on the alternate download server.

Registry Path: HKLM\\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\UseWUServer (0=Disabled, 1=Enabled)

>[!NOTE]
>If the "Configure Automatic Updates" policy is disabled, then this policy has no effect.
>
Expand Down Expand Up @@ -107,6 +109,8 @@ Even when Windows Update is configured to receive updates from an intranet updat

Use **Computer Configuration\Administrative Templates\Windows Components\Windows update\Do not connect to any Windows Update Internet locations** to enable this policy. When enabled, this policy will disable the functionality described above, and may cause connection to public services such as the Microsoft Store, Windows Update for Business, and Delivery Optimization to stop working.

Registry: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\DoNotConnectToWindowsUpdateInternetLocations (0=Disbaled, 1=Enabled)

>[!NOTE]
>This policy applies only when the device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy.

Expand All @@ -125,13 +129,15 @@ If the intranet Microsoft update service supports multiple target groups, this p

### Allow signed updates from an intranet Microsoft update service location

This policy setting allows you to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location.
This policy setting allows you to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. This settings is generally used when wanting to enable third-party updates through a non-Microsoft source.

To configure this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows update\Allow signed updates from an intranet Microsoft update service location**.

If you enable this policy setting, Automatic Updates accepts updates received through an intranet Microsoft update service location, as specified by [Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location), if they're signed by a certificate found in the "Trusted Publishers" certificate store of the local computer.
If you disable or don't configure this policy setting, updates from an intranet Microsoft update service location must be signed by Microsoft.

Registry: HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AcceptTrustedPublisherCerts (0=Disabled, 1=Enabled)

>[!NOTE]
>Updates from a service other than an intranet Microsoft update service must always be signed by Microsoft and are not affected by this policy setting.

Expand Down